Scribit Jonathan S. Shapiro dies 18/10/2005 hora 15:58:
> In principle, we could do something similar for capabilities that
> travel from one user to another -- any time a capability crosses this
> boundary it's wrapper is replaced. This replacement is implemented by
> a reference monitor.

How does the system knows you cross the boundary? If a process belonging
to a different user gets the capability, how does anyone know it is in
fact a different user?

Curiously,
Nowhere man
-- 
[EMAIL PROTECTED]
OpenPGP 0xD9D50D8A

Attachment: signature.asc
Description: Digital signature

_______________________________________________
L4-hurd mailing list
[email protected]
http://lists.gnu.org/mailman/listinfo/l4-hurd

Reply via email to