> Hi Scott, > > Doesn't that strike you as a layering violation? Shouldn't a stack shield > applications from having to create these mechanisms?
Not really. Applications do have their own concept of identity, for very good reasons -- think of the difference between managing corporate data, your personal email, and an online game. They also have their own specific "time line" -- anywhere between instant to forever. It is quite hard to develop a "one size fits all" solution. Otherwise, "the market" probably would have created one. -- Christian Huitema _______________________________________________ rrg mailing list rrg@irtf.org http://www.irtf.org/mailman/listinfo/rrg