-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Marcus Brinkmann schrieb: > The decision which processes can access a tagged resource with extra > privileges would be made by the processes doing the tagging according > to its security policy.
How is that different from a design where every process can hand out intransparent memory (that is, memory the process can only reclaim, not inspect)? Wouldn't your design introduce all the harmful properties it tries to abolish in the first place? - -- - -ness- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFFolpFvD/ijq9JWhsRAsSHAJ9bifmdJus2yLY68OE7SXF8ubzsbACfX9EK l55rXsWQyEMhxc+TkgORHqw= =Y/Fk -----END PGP SIGNATURE----- _______________________________________________ L4-hurd mailing list [email protected] http://lists.gnu.org/mailman/listinfo/l4-hurd
