On 02/28/2011 09:08 PM, Robert J. Hansen wrote: >> There are probably many more issues like that tucked away once you start >> to think seriously about implementing the feature properly. > > There's a lot of stuff in the literature on this subject. This sort of > behavior is usually called ORCON, for "ORiginator CONtrolled" -- referring > usually to intelligence so sensitive the source controls who sees the intel > and how it is used. > > The first paper I can find on this subject belongs to Graubert, "On the Need > for a Third Form of Access Control," _Proceedings of the 12th National > Computer Security Conference_. It's worth reading. >
Thanks for the heads up. Looks interesting. -- -Grant "Look around! Can you construct some sort of rudimentary lathe?"
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users