[XML-DEV Mailing List Archive Home] [By Thread] [By Date] [Recent Entries] [Reply To This Message] RE: Are people really using Identity constraints specified in
That used to be called the 'mosaic problem' in security circles years ago. Enough 'no's outline the shape of the thing. If you need to protect the thing, you have to return an answer of "I cannot confirm or deny.." and then they know something is important but not exactly what. Meanwhile, the repeated attempts and negative answers emit a pattern of behavior that can be detected which is why we have time/node stamps on queries and all of that metadata is [expletive deleted] up cycles. So yeah, hardware indeed. Sigh... so much spy vs spy work. len From: Hunsberger, Peter [mailto:Peter.Hunsberger@S...] It's got nothing to do with content, rather it's the problem that privacy rules (business rules) can be violated by negative responses. To work around that requires that you understand the context of the query and the results in combination with each other. This is one of those areas, where if you have to solve the problem, you can likely justify throwing non-trivial amounts of hardware at it...
|
PURCHASE STYLUS STUDIO ONLINE TODAY!Purchasing Stylus Studio from our online shop is Easy, Secure and Value Priced! Download The World's Best XML IDE!Accelerate XML development with our award-winning XML IDE - Download a free trial today! Subscribe in XML format
|