W3C home > Mailing lists > Public > ietf-http-wg@w3.org > July to September 2012

Re: Content security model

From: Phillip Hallam-Baker <hallam@gmail.com>
Date: Thu, 26 Jul 2012 13:42:55 -0400
Message-ID: <CAMm+Lwgi7kgFj-z4o+5sGV8f7q6Qj=XbwF-LOL8w5TEE4kSKew@mail.gmail.com>
To: Martin Thomson <martin.thomson@gmail.com>
Cc: grahame@healthintersections.com.au, James French <jfrench@denirostaff.com>, "ietf-http-wg@w3.org Group" <ietf-http-wg@w3.org>
On Thu, Jul 26, 2012 at 11:52 AM, Martin Thomson
<martin.thomson@gmail.com> wrote:
> On 25 July 2012 18:00, Phillip Hallam-Baker <hallam@gmail.com> wrote:
>> A trusted intermediary can do anything it likes and the recipient will
>> accept the data (provided that the trusted intermediary
>> re-authenticates it)
>
> Well, there is trust and then there is trust.  I might trust an
> intermediary to look at my data to determine if it contains bad stuff,
> but I might not trust it to modify it.  One problem with the current
> system is that you don't get to choose.

Exactly.

If I have a purchasing system I want to have a split control so that a
purchase order requires an authorization by a manager and a
confirmation by the purchasing clerk.

The purchasing clerk (or rather their computer) needs to see the
contents of the purchase order but must not be capable of generating
orders by themselves. That leads to $15 million carbon credit frauds.

-- 
Website: http://hallambaker.com/
Received on Thursday, 26 July 2012 17:43:27 GMT

This archive was generated by hypermail 2.2.0+W3C-0.50 : Thursday, 26 July 2012 17:43:33 GMT