Yup, certainly anyone who's thought about paying for, say, grid networks time, or wireless access, has at least plinked around with the subject, but it's nice that someone like *Nick* is thrashing some cycles on the problem.
:-) In the interest of "telegraph, telephone, tell Hettinga", I'm just sending this along and will read it myself later. Cheers, RAH ------- --- begin forwarded text Date: 16 Mar 2004 21:22:38 -0000 From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Scarce objects -- bearer certificates for usage control (Bob -- feel free to forward this to whatever list(s) you think might be interes ted -- Nick). I desribe an architecture providing usage control (as opposed to access control) for mutually suspicious objects (i.e., objects interacting across trust boundar ies), using bearer certificates: http://szabo.best.vwh.net/scarce.html Nick Szabo http://szabo.best.vwh.net/ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ --- end forwarded text -- ----------------- R. A. Hettinga <mailto: [EMAIL PROTECTED]> The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
