Talk:Privilege revocation (computing)
Latest comment: 15 years ago by 62.195.107.55 in topic Information theory vs Computer security
This article is rated Stub-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||
|
Information theory vs Computer security
editThis article reads as though the term is equivalent/synonymous in both those fields. While in theory something (such as a key, ticked or certificate) may be revoked, without effecting system security policy. Further more benevolent processes (programs, spawn by users, etc) may revoke privileges for system reliability. However this may then pose a false sense of security in any observer of the system as to the privileges obtainable by the user (or process). —Preceding unsigned comment added by 62.195.107.55 (talk) 20:56, 28 June 2009 (UTC)