None
11/06/2004 3:25 PM
post4500
|
"person as proxy"
[Posted by Jennifer Teig von Hoffman, jtvh@bu.edu, 11/6/04]
* Section 3.6.1: The first sentence has either a capitalization error after the first comma, or some other problem has
emerged; I'm not entirely sure from the context.
* A more general comment, which may be entirely out of the scope that this document is intended to address . . .
Perhaps I haven't read the document carefully enough, but it seems to me that it may not address one of the issues I see
as an AG operator -- the fact that the people who need access to the AG and the shared data are often not the same
people who operate the AG nodes. Perhaps as the AG continues to improve ease of use, this will cease to the case,
leaving this as a non-issue. But in the interim, the social/organization issues around authentication get muddy. If
Glenn's attending a meeting over the AG, is it he who needs to be on the ACL to enter the venue, or is it Ariella, who's
operating the node for him? And what if she calls in sick (or goes into labor, more likely at the moment), and I end up
filling in for her?
ACEs might bring this issue into the forefront more than some other technologies. But it's reminiscient of the
stereotypical CEO of the mid-1990s who asks his secretary to fax him his email when he's on the road. Person as proxy.
Of course, I'm pointing out a problem here for which I don't think I know the answer. But I'd love to be involved in
helping to explore the problem if this is of interest to the group, either in the context of this document or more
generally in the group's work.
|
|
|