Talk:Privilege revocation (computing)

Latest comment: 15 years ago by 62.195.107.55 in topic Information theory vs Computer security

Information theory vs Computer security

edit

This article reads as though the term is equivalent/synonymous in both those fields. While in theory something (such as a key, ticked or certificate) may be revoked, without effecting system security policy. Further more benevolent processes (programs, spawn by users, etc) may revoke privileges for system reliability. However this may then pose a false sense of security in any observer of the system as to the privileges obtainable by the user (or process). —Preceding unsigned comment added by 62.195.107.55 (talk) 20:56, 28 June 2009 (UTC)Reply