[1910] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

An accounting question...

daemon@ATHENA.MIT.EDU (Chih-Hung Feng (791018))
Thu Apr 25 08:14:17 1996

From: chfeng@iii.org.tw (Chih-Hung Feng (791018))
To: www-security@ns2.rutgers.edu (www security)
Date: Thu, 25 Apr 1996 17:19:37 +0800 (CST)
Errors-To: owner-www-security@ns2.rutgers.edu


Hi:

    Could someone enlighten me on the following question? 

    A local company(not the one I am employed) is thinking about
providing database service on the net. The idea is put a database
on the Internet and allow users to extract the information through
WWW interface. The requirements are:

    1.  the users must identify themselves before viewing the 
        document,  and 
    2.  the users are charged with the quantity of information
        (pieces of documents/Mbytes/etc) being received.

    The first req. can be easily satisfied, but the second really
beats me. How can I identify those requests from a valid user who 
has successfully passed earlier I&A stage? How can I make sure these 
requests are from that user, while someone else can be using his 
system at the same time?

    If what I described is too vague to understand, please tell
me and I would like to give more details. Any ideas (even that
you think it is impossible based on current web server behavior) 
would be greatly appreciated. Thank you very much for your time.

-- 
   Chih-Hung Feng <chfeng@iii.org.tw>

home help back first fref pref prev next nref lref last post