On 15 October 2014 19:46, Robert Haas <robertmh...@gmail.com> wrote: >> In IT terms, we're looking at controlling and reducing improper access >> to data by an otherwise Trusted person. The only problem is that some >> actions on data items are allowed, others are not. > > Sure, I don't disagree with any of that as a general principle. I > just think we should look for some ways of shoring up your proposal > against some of the more obvious attacks, so as to have more good and > less bad.
Suggestions welcome. I'm not in a rush to implement this, so we have time to mull it over. -- Simon Riggs http://www.2ndQuadrant.com/ PostgreSQL Development, 24x7 Support, Training & Services -- Sent via pgsql-hackers mailing list (pgsql-hackers@postgresql.org) To make changes to your subscription: http://www.postgresql.org/mailpref/pgsql-hackers