Rep (2) : Comments from C Huitema ...
Alain Zahm <zahm@osi.e3x.fr> Thu, 07 January 1993 17:46 UTC
Received: from ietf.nri.reston.va.us by IETF.CNRI.Reston.VA.US id aa05083;
7 Jan 93 12:46 EST
Received: from CNRI.RESTON.VA.US by IETF.CNRI.Reston.VA.US id aa05079;
7 Jan 93 12:46 EST
Received: from haig.cs.ucl.ac.uk by CNRI.Reston.VA.US id aa14513;
7 Jan 93 12:47 EST
X400-Received: by mta haig.cs.ucl.ac.uk in /PRMD=uk.ac/ADMD=gold 400/C=gb/;
Relayed; Thu, 7 Jan 1993 16:55:18 +0000
Date: Thu, 7 Jan 1993 16:55:18 +0000
X400-Originator: osi-ds-request@cs.ucl.ac.uk
X400-Recipients: non-disclosure:;
X400-MTS-Identifier: [/PRMD=uk.ac/ADMD=gold 400/C=gb/;
haig.cs.uc.545:07.00.93.16.55.18]
Priority: Non-Urgent
DL-Expansion-History: osi-ds@cs.ucl.ac.uk ; Thu, 7 Jan 1993 16:55:18 +0000;
Sender: ietf-archive-request@IETF.CNRI.Reston.VA.US
From: Alain Zahm <zahm@osi.e3x.fr>
Message-ID: <72642593326055zahm*/S=zahm/OU=OSI/O=E3X/PRMD=E3X/ADMD=atlas/C=FR/@MHS>
To: osi-ds@cs.ucl.ac.uk, wg-nap@rare.nl, rosenthl@mcc.com,
pays@faugeres.inria.fr
In-Reply-To: "726403989.28488.0(a)faugeres.inria.fr":
Subject: Rep (2) : Comments from C Huitema ...
> > There are 2 aspects > > 1. I don't see any feature of X.500 that would enable, according > to the requestor identity, to select automaticaly and transparently > > either the authoritative ot the non-authoritative information > [[that could be an improvement of X.500 to allow for attributes > to have different tagged values, some being tagged as > being authoritative and other non-authoritative. > But this is a different story :-( ]] > > > 2. I think it is useful to have the possibility to explicitely select > which one is needed for a specific application > . applications (eg. payroll or other) will allways use the authoritative > subtree. The only one for which some administration/operator > would bring the responsiblity for the contained information > . interactive-users may select explicitely what they want > . the subtree official manager will (as explained in my 1rst posting) > periodically run an application which would after any desirable > control update the authoritative subtree using the > non-authoritative one (at disposal of the end-users for > modifying their own non-protected data such as fax-number > email aso) > an alternative would be to consider that, as modifications are allowd on the original, that the authoritative dats represent a cache (i.e. copy) of the non authoritative datas. Then by specifying the explicit use of a copy or not, access would be offered through one or another database. Of course the copy should be always the default, thus the authoritative one. But this eems to be a good model of what tou want? Regards Alain Zahm
- Rep (2) : Comments from C Huitema ... Alain Zahm