tag:blogger.com,1999:blog-6057799.post4839752424863023213..comments2023-03-26T18:47:47.424-05:00Comments on --Mike--: Confused DeputyMike Warothttp://www.blogger.com/profile/12975818268596648269noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-6057799.post-91798718891639328422008-05-05T22:46:00.000-05:002008-05-05T22:46:00.000-05:00So how would you suggest scaling capabilities to t...So how would you suggest scaling capabilities to the internet? Everything I've always read about capability-based security alludes to persisting and passing file handles, but what does this look like on the web?<BR/><BR/>Of course, more ACLs only lead to more confused deputy deputies, but how do you actually pass capabilities? The closest I can think of is OAuth, but frankly, I don't quite understand...<BR/><BR/>Can you elaborate a little further on what you're envisioning?Anonymousnoreply@blogger.com