[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

"trust management" vs. "certified identity"



This is reminiscent of a recent idea of mine. Imagine the following signed
declaration:

I (fingerprint = ...) claim that the code X with SH (secure hash) = ...
satisfies contract with SH= ... when its free code pointers are bound to
other code conforming to contracts identified within X by their SH's.

The contracts would be either formal or informal.

When a Java program arrives at a client it can warrant its services if it
finds local access to warranted sub-routines. (For this purpose behaviors
of objects are sub-routines.)

The Java loader can build warrants recursively with such declarations. They
would, of course, be relative to the reputation of signers of the above
declarations.

I have just sent for your paper.