Berin Loritsch wrote:
> Regarding the ComponentValidator, I am temporarily relenting and
> moving on. To my knowlege we are all in agreement concerning
> Logging. That remains one sore spot to my knowlege *before* we
> release.
Berin:
I think the points you have made in this thread are
right-on-the-money!
I think your talking about security concerns in the same way that I
think about security. Aside from whatever authentication solution,
access control mechanisms, trust management and so forth, if your
building a "valuable" system (i.e. a system handling valuable
assets), you design and build with the assumption that the system
WILL-BE-COMPROMISED. With this presumption there are a variety of
mechanisms that can employed to hide sensitive resources - but
achieving this requires defensive code - because you can never
totally depend on the container because there is always the question
of compromising the contains container (recursively). I disagree
with comments on this thread that this means you have already
lost the battle - internal subsystems can be much more defensive than
their containers. But building defensive systems means very rigorous
enforcement within an object of its operation state - and for that
runtime validation against standard lifecycle semantics is just
plain good-sense.
Cheers, Steve.
--
To unsubscribe, e-mail: <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>