> Hi Scott,
> 
> Doesn't that strike you as a layering violation?  Shouldn't a stack shield
> applications from having to create these mechanisms?

Not really. Applications do have their own concept of identity, for very
good reasons -- think of the difference between managing corporate data,
your personal email, and an online game. They also have their own specific
"time line" -- anywhere between instant to forever. It is quite hard to
develop a "one size fits all" solution. Otherwise, "the market" probably
would have created one.

-- Christian Huitema




_______________________________________________
rrg mailing list
rrg@irtf.org
http://www.irtf.org/mailman/listinfo/rrg

Reply via email to