On 19-07-11 02:35, Peter Firmstone wrote:
Uuid). The problem they ran into; the service and proxy needed to be trust verified again after the connection was reestablished, but permissions had already been granted. To make matters worse it was the
I think that we only reach an optimal trust situation when we reduce the jeri endpoint concept to a stream based solution, and transmit this stream in blocks, and run an TLS session over this stream.
In order to create this we could factor out of a current endpoint solution an abstract endpoint with an abstracted stream/block transport. We can then create concrete endpoint solutions where an transport is plugged into the endpoint. This transport could be fetched from a factory based on URL.
Gr. Sim -- QCG, Software voor het MKB, 071-5890970, http://www.qcg.nl Quality Consultancy Group b.v., Leiderdorp, Kvk Den Haag: 28088397