Jump to content

Talk:Privilege revocation (computing)

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Information theory vs Computer security

This article reads as though the term is equivalent/synonymous in both those fields. While in theory something (such as a key, ticked or certificate) may be revoked, without effecting system security policy. Further more benevolent processes (programs, spawn by users, etc) may revoke privileges for system reliability. However this may then pose a false sense of security in any observer of the system as to the privileges obtainable by the user (or process). —Preceding unsigned comment added by 62.195.107.55 (talk) 20:56, 28 June 2009 (UTC)[reply]