Rep (2) : Comments from C Huitema ...

Alain Zahm <zahm@osi.e3x.fr> Thu, 07 January 1993 17:46 UTC

Received: from ietf.nri.reston.va.us by IETF.CNRI.Reston.VA.US id aa05083; 7 Jan 93 12:46 EST
Received: from CNRI.RESTON.VA.US by IETF.CNRI.Reston.VA.US id aa05079; 7 Jan 93 12:46 EST
Received: from haig.cs.ucl.ac.uk by CNRI.Reston.VA.US id aa14513; 7 Jan 93 12:47 EST
X400-Received: by mta haig.cs.ucl.ac.uk in /PRMD=uk.ac/ADMD=gold 400/C=gb/; Relayed; Thu, 7 Jan 1993 16:55:18 +0000
Date: Thu, 7 Jan 1993 16:55:18 +0000
X400-Originator: osi-ds-request@cs.ucl.ac.uk
X400-Recipients: non-disclosure:;
X400-MTS-Identifier: [/PRMD=uk.ac/ADMD=gold 400/C=gb/; haig.cs.uc.545:07.00.93.16.55.18]
Priority: Non-Urgent
DL-Expansion-History: osi-ds@cs.ucl.ac.uk ; Thu, 7 Jan 1993 16:55:18 +0000;
Sender: ietf-archive-request@IETF.CNRI.Reston.VA.US
From: Alain Zahm <zahm@osi.e3x.fr>
Message-ID: <72642593326055zahm*/S=zahm/OU=OSI/O=E3X/PRMD=E3X/ADMD=atlas/C=FR/@MHS>
To: osi-ds@cs.ucl.ac.uk, wg-nap@rare.nl, rosenthl@mcc.com, pays@faugeres.inria.fr
In-Reply-To: "726403989.28488.0(a)faugeres.inria.fr":
Subject: Rep (2) : Comments from C Huitema ...

> 
> There are 2 aspects
> 
> 1. I don't see any feature of X.500 that would enable, according
> to the requestor identity, to select automaticaly and transparently
> 
> either the authoritative ot the non-authoritative information
>   [[that could be an improvement of X.500 to allow for attributes
> 	to have different tagged values, some being tagged as
> 	being authoritative and other non-authoritative.
> 	But this is a different story :-( ]]
> 
> 
> 2. I think it is useful to have the possibility to explicitely select
> which one is needed for a specific application
>   . applications (eg. payroll or other) will allways use the authoritative
> 	subtree. The only one for which some administration/operator
> 	would bring the responsiblity for the contained information
>   . interactive-users may select explicitely what they want
>   . the subtree official manager will (as explained in my 1rst posting)
> 	periodically run an application which would after any desirable
> 	control update the authoritative subtree using the
> 	non-authoritative one (at disposal of the end-users for
> 	modifying their own non-protected data such as fax-number
> 	email aso)
> 

an alternative would be to consider that, as modifications are allowd on
the original, that the authoritative dats represent a cache (i.e. copy) of
the non authoritative datas. Then by specifying the explicit use of a copy
or not, access would be offered through one or another database. Of course
the copy should be always the default, thus the authoritative one. But this
eems to be a good model of what tou want?

Regards

Alain Zahm