Scribit Jonathan S. Shapiro dies 18/10/2005 hora 15:58: > In principle, we could do something similar for capabilities that > travel from one user to another -- any time a capability crosses this > boundary it's wrapper is replaced. This replacement is implemented by > a reference monitor.
How does the system knows you cross the boundary? If a process belonging to a different user gets the capability, how does anyone know it is in fact a different user? Curiously, Nowhere man -- [EMAIL PROTECTED] OpenPGP 0xD9D50D8A
signature.asc
Description: Digital signature
_______________________________________________ L4-hurd mailing list [email protected] http://lists.gnu.org/mailman/listinfo/l4-hurd
