OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.


Help: OASIS Mailing Lists Help | MarkMail Help

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Copyrighting schemas, Hailstorm

Ok, but a term for which we have no useful 
definition does not provide much that is useful.  
This dips into the philosophy of self and that is irrelevant. 

Identification or assertion of identity is an 
act and auditing the act is doable.  One act 
asserts identity and another asserts the 
correctness of the assertion (authentication). 

In a wide open system, ensuring 
the actor owns the asserted property is very 
difficult.  That is why the most highly secured 
systems are in vaults and have no external 
connections.  Protection is commensurate with 
risk.  As individuals risk more, they want and 
need more protection.  Hailstorm is MS trying 
to both enable more services across more platforms 
while enabling more protection.   The question 
is does it work?  Then who works it? 

But the original question is if the means is 
system wide, can they assert ownership of means.

Len Bullard
Intergraph Public Safety

Ekam sat.h, Vipraah bahudhaa vadanti.
Daamyata. Datta. Dayadhvam.h

-----Original Message-----
From: Dimitris Dimitriadis [mailto:dimitris.dimitriadis@improve.se]
Sent: Friday, June 01, 2001 2:09 PM
To: Bullard, Claude L (Len)
Subject: SV: Copyrighting schemas, Hailstorm

Comments inlined.

Main argument: identification asserts identity, contrary to the claim that
identity does not exist. Therefore, he who controls assertion of identity
(or validation of identity claims), has leverage on identity itself.