This is an old revision of this page, as edited by 62.195.107.55(talk) at 20:56, 28 June 2009(imo this article should be corrected/re-edited). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.Revision as of 20:56, 28 June 2009 by 62.195.107.55(talk)(imo this article should be corrected/re-edited)
This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing
This article has been automatically rated by a bot or other tool as Stub-class because it uses a stub template. Please ensure the assessment is correct before removing the |auto= parameter.
This article is within the scope of WikiProject Law, an attempt at providing a comprehensive, standardised, pan-jurisdictional and up-to-date resource for the legal field and the subjects encompassed by it.LawWikipedia:WikiProject LawTemplate:WikiProject Lawlaw
This article reads as though the term is equivalent/synonymous in both those fields. While in theory something (such as a key, ticked or certificate) may be revoked, without effecting system security policy. Further more benevolent processes (programs, spawn by users, etc) may revoke privileges for system reliability. However this may then pose a false sense of security in any observer of the system as to the privileges obtainable by the user (or process).