I haven't used any examples that refer to specific situations, if it has you worried. Any resemblanc
anonymous
February 8 2011, 23:52:43 UTC
If a malicious agent can impersonate the decider component to the enforcer component, or if a malicious agent can impersonate any source of inputs to the decision, then the malicious agent can subvert the mecha-nism. If any of the components or external decision input sources are not collocated within a single application, then the access control mechanism requires a protected path mechanism
( ... )
Comments 4
Reply
Reply
Reply
Reply
Leave a comment