[197] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: what are realistic threats?

daemon@ATHENA.MIT.EDU (hallam@dxal18.cern.ch)
Fri Oct 7 14:12:03 1994

From: hallam@dxal18.cern.ch
To: Tim Berners-Lee <timbl@quag.lcs.mit.edu>
Cc: hallam@dxal18.cern.ch, www-security@ns1.rutgers.edu
In-Reply-To: Your message of "Thu, 06 Oct 94 17:46:35 -0400."
             <9410062146.AA05527@quag.lcs.mit.edu> 
Date: Fri, 07 Oct 94 12:33:24 +0100
Reply-To: hallam@dxal18.cern.ch

[Sorry about earlier blank posting, network prob.]

To sumarise Tim's post :

* Each user choses their own authentication hierarchy by compositing other
	hierarchies.


Within this general idea I think we need to expand just a little :-

* For user, read party. Organisations may have their own corporate systems of
	trust. If I sign a document to be paid for by CERN they will want their
	system of trust to be applied.

* Trust is context dependent. I may trust Joe not to send me a duff RFC but
	not trust him an inch with money

* Trust is limited, I may trust Joe to $10 and AMEX to $1000. 

But just to complicate matters:

* I almost certainly want to keep my personal system of trust private. I do
	not want Joe to know that I don't trust him. We cannot arbitrate simply
	by sending out our trust mapping to others. 

	Phill.



home help back first fref pref prev next nref lref last post