l4-hurd
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Wrapper design patterns (was: Revocation vs destruction)


From: Jonathan S. Shapiro
Subject: Re: Wrapper design patterns (was: Revocation vs destruction)
Date: Tue, 29 Nov 2005 13:45:24 -0500

On Tue, 2005-11-29 at 15:17 +0100, Pierre THIERRY wrote:
> Scribit Jonathan S. Shapiro dies 18/10/2005 hora 15:58:
> > In principle, we could do something similar for capabilities that
> > travel from one user to another -- any time a capability crosses this
> > boundary it's wrapper is replaced. This replacement is implemented by
> > a reference monitor.
> 
> How does the system knows you cross the boundary? If a process belonging
> to a different user gets the capability, how does anyone know it is in
> fact a different user?

Remember that in this scenario the only paths between users go through a
reference monitor. The reference monitor performs the substitution.

shap





reply via email to

[Prev in Thread] Current Thread [Next in Thread]