On 02/28/2011 09:08 PM, Robert J. Hansen wrote:
>> There are probably many more issues like that tucked away once you start
>> to think seriously about implementing the feature properly.
> 
> There's a lot of stuff in the literature on this subject.  This sort of 
> behavior is usually called ORCON, for "ORiginator CONtrolled" -- referring 
> usually to intelligence so sensitive the source controls who sees the intel 
> and how it is used.
> 
> The first paper I can find on this subject belongs to Graubert, "On the Need 
> for a Third Form of Access Control," _Proceedings of the 12th National 
> Computer Security Conference_.  It's worth reading.
> 

Thanks for the heads up.  Looks interesting.

-- 
-Grant

"Look around! Can you construct some sort of rudimentary lathe?"

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

Reply via email to