> There are probably many more issues like that tucked away once you start
> to think seriously about implementing the feature properly.

There's a lot of stuff in the literature on this subject.  This sort of 
behavior is usually called ORCON, for "ORiginator CONtrolled" -- referring 
usually to intelligence so sensitive the source controls who sees the intel and 
how it is used.

The first paper I can find on this subject belongs to Graubert, "On the Need 
for a Third Form of Access Control," _Proceedings of the 12th National Computer 
Security Conference_.  It's worth reading.


_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to