Re: thy tiers might cease...

> Learning what the concepts of Retrieve, Locate, and Validate is not
> difficult. However, they are rather arbitrary tokens (e.g., collision on
> validate) and what one is actually doing is sending a request and asking
> for some information. Let the query state what is being asked for: the key
> value, KeyInfo, KeyInfo and trust information.

I can understand the surface appeal, but I believe the semantics are so
different, and so well-understood by the security community, that this
would be a bad idea.

I mean, it's like old VMS or VB properties, you can turn everything into
SET and GET, but it's not the best thing in the world. :)
	/r$

-- 
Zolera Systems, Securing web services (XML, SOAP, Signatures,
Encryption)
http://www.zolera.com

Received on Wednesday, 6 March 2002 18:46:15 UTC