Yup, certainly anyone who's thought about paying for, say, grid networks
time, or wireless access, has at least plinked around with the subject, but
it's nice that someone like *Nick* is thrashing some cycles on the problem.

:-)

In the interest of "telegraph, telephone, tell Hettinga", I'm just sending
this along and will read it myself later.

Cheers,
RAH
-------
--- begin forwarded text


Date: 16 Mar 2004 21:22:38 -0000
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Scarce objects -- bearer certificates for usage control


(Bob -- feel free to forward this to whatever list(s) you think might be
interes
ted -- Nick).

I desribe an architecture providing usage control (as opposed to access
control)
 for mutually suspicious objects (i.e., objects interacting across trust
boundar
ies), using bearer certificates:

http://szabo.best.vwh.net/scarce.html


Nick Szabo
http://szabo.best.vwh.net/

~
~
~
~
~
~
~
~
~
~
~
~
~

--- end forwarded text


-- 
-----------------
R. A. Hettinga <mailto: [EMAIL PROTECTED]>
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

Reply via email to