"trust management" vs. "certified identity"
17 Dec
2003
17 Dec
'03
11:17 p.m.
This is reminiscent of a recent idea of mine. Imagine the following signed declaration: I (fingerprint = ...) claim that the code X with SH (secure hash) = ... satisfies contract with SH= ... when its free code pointers are bound to other code conforming to contracts identified within X by their SH's. The contracts would be either formal or informal. When a Java program arrives at a client it can warrant its services if it finds local access to warranted sub-routines. (For this purpose behaviors of objects are sub-routines.) The Java loader can build warrants recursively with such declarations. They would, of course, be relative to the reputation of signers of the above declarations. I have just sent for your paper.
8070
Age (days ago)
8070
Last active (days ago)
0 comments
1 participants
participants (1)
-
norm@netcom.com