From mboxrd@z Thu Jan 1 00:00:00 1970 From: Jim Choate To: <9fans@cse.psu.edu> In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Subject: [9fans] And what about secure computing? Date: Sun, 5 Oct 2003 11:58:07 -0500 Topicbox-Message-UUID: 5fc1c51c-eacc-11e9-9e20-41e7f4b1d025 One of the problems we've been looking at on H18 is how to handle security issues with regard to users programs and where they run. The current idea is that each process has a 'security' tag that sets some level of sensitivity with regard to public exposure. And then a 'trust' parameter for each machine or cluster of machines. So a site might have processes running at verious levels of 'security' and then assign them to clusters based on 'trust'. So internal accounting programs would run only on machines that had the highest trust level, whereas a webpage might be accessible to all and thus processes related to it might run in a public cluster of processors. -- -- God exists because mathematics is consistent, and the Devil exist because we can't prove it. Andre Weil, in H. Eves, Mathematical Circles Adieu ravage@ssz.com jchoate@open-forge.com www.ssz.com www.open-forge.com