This chapter will explain the. potential man in the middle attack that a distributed capability system could be vulnerable to, and how the logic of The Grant Matcher succeeds in avoiding it. The Unibus protocol sketch shows concretely what it means to design a protocol that doesn't suffer from this vulnerability. |
||||||||||||
Unless stated otherwise, all text on this page which is either unattributed or by Mark S. Miller is hereby placed in the public domain.
|