On 15 October 2014 19:46, Robert Haas <[email protected]> wrote: >> In IT terms, we're looking at controlling and reducing improper access >> to data by an otherwise Trusted person. The only problem is that some >> actions on data items are allowed, others are not. > > Sure, I don't disagree with any of that as a general principle. I > just think we should look for some ways of shoring up your proposal > against some of the more obvious attacks, so as to have more good and > less bad.
Suggestions welcome. I'm not in a rush to implement this, so we have time to mull it over. -- Simon Riggs http://www.2ndQuadrant.com/ PostgreSQL Development, 24x7 Support, Training & Services -- Sent via pgsql-hackers mailing list ([email protected]) To make changes to your subscription: http://www.postgresql.org/mailpref/pgsql-hackers
