Discussion with Stevej about capabilities.
Here's my take in the nutshell. Capabilities is granting of access control to information based on the information itself as opposed to more tratitional authentication where it is the notion of who the user is as opposed to what the user wants to see that is important.
I'm wondering if the shit that the NSA is doing with linux might have some ideas in that area. Steve says that there is some work that has been done on it but it's old. Jason Hunters Servlet book hints at it but gives no details. I'd like to see this written out in detail from a theoretical perspective.
More after I pick up the wife from work.