FW: Image Unique Identifier
Ron Teitelbaum
Ron at USMedRec.com
Thu Aug 24 15:49:49 UTC 2006
Hi Lex,
Very nice links, I will read through them carefully.
Thank you!
Ron Teitelbaum
> From: Lex Spoon
> Sent: Thursday, August 24, 2006 11:18 AM
>
> "Ron Teitelbaum" <Ron at USMedRec.com> writes:
> > Thank you for your response. I had considered IP Address, computer
> name,
> > NIC address and PID. But when I thought more about it I thought they
> were
> > too public.
>
> Maybe you should divide the problem into two halves? First solve the
> ID problem, then solve the cryptographic-key(s) problem. I have been
> talking about the ID part, for which the above seem to be just fine.
> It seems like an inescapable core of a remote object reference is
> going to include this kind of public material, just so that you can
> actually send your network packets to the right place.
>
> You can then add a secret part. For that, I do not have a firm
> suggestion, but you will certainly need to look into cryptography and
> into random number generators. I would be sure to check out what E
> does for sturdy references:
>
> http://www.erights.org/elang/concurrency/introducer.html
>
>
>
> By the way, if you are interested in Internet security in general, you
> should check out the "Y property" stuff. Start from
> http://www.yurl.net and follow the links.
>
>
> -Lex
>
>
More information about the Squeak-dev
mailing list
|