tag:blogger.com,1999:blog-12447072.post3838974833342848991..comments2024-02-13T08:56:52.521-05:00Comments on ConnectID: As long as X is true .....Paul Madsenhttp://www.blogger.com/profile/08489111023182783403noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-12447072.post-24292493148100469172014-10-09T09:03:59.025-04:002014-10-09T09:03:59.025-04:00Thanks for the comment Gluu. Thanks for the tip on...Thanks for the comment Gluu. Thanks for the tip on XACML, will look into that......Paul Madsenhttps://www.blogger.com/profile/08489111023182783403noreply@blogger.comtag:blogger.com,1999:blog-12447072.post-75339891883957588832014-10-08T16:07:28.316-04:002014-10-08T16:07:28.316-04:00What you are expressing is security policies. A lo...What you are expressing is security policies. A lot of work needs to be done on how people can intuitively express policies. At the high end (government or military for example), there is a structure policy language called XACML. Below that, many applications code security policies into the application. IOT is pushing the boundaries of policy management to the consumer, especially as there is a Gluuhttps://www.blogger.com/profile/15811160606644291854noreply@blogger.com