<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://panoptic.com/mediawiki/aolserver/index.php?action=history&amp;feed=atom&amp;title=Talk%3AAOLserver_Improvement_Proposals</id>
	<title>Talk:AOLserver Improvement Proposals - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://panoptic.com/mediawiki/aolserver/index.php?action=history&amp;feed=atom&amp;title=Talk%3AAOLserver_Improvement_Proposals"/>
	<link rel="alternate" type="text/html" href="https://panoptic.com/mediawiki/aolserver/index.php?title=Talk:AOLserver_Improvement_Proposals&amp;action=history"/>
	<updated>2026-04-24T21:37:25Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.34.2</generator>
	<entry>
		<id>https://panoptic.com/mediawiki/aolserver/index.php?title=Talk:AOLserver_Improvement_Proposals&amp;diff=4489&amp;oldid=prev</id>
		<title>Caveman: added shared memory authorization model draft for discussion</title>
		<link rel="alternate" type="text/html" href="https://panoptic.com/mediawiki/aolserver/index.php?title=Talk:AOLserver_Improvement_Proposals&amp;diff=4489&amp;oldid=prev"/>
		<updated>2005-12-03T17:02:20Z</updated>

		<summary type="html">&lt;p&gt;added shared memory authorization model draft for discussion&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;
'''Shared memory authorization model.'''&lt;br /&gt;
&lt;br /&gt;
Data in shared nsd_ arrays:&lt;br /&gt;
#. One solution would be to suggest encrypt/decrypt all values from user perspective, this could be done without any server code change.&lt;br /&gt;
#. Another solution would be to re-impliment shared nsd_ array by attaching authorization context to executing threads and evaluating that context for protected memory. This would require significant server code change and likely break existing code.&lt;br /&gt;
#. Alternative to above would be to provide nsd_sec_ or similar functions that are instrumented with authorization calls, but perform similar function to current nsd_ shared arrays. Applications that want to have their shared memory data protected would use these functions -- the nsd_ functions would not have access to these arrays. This could be provided via an additional module that accesses a secondary non-addressable (to nsd_) shared memory space. Suggestion would be to have a tree structure of named hierarchical nodes (&amp;quot;root/myapp/myvar&amp;quot;) where authorization model could protect &amp;quot;root/myapp/*&amp;quot; according to some policy (say, current executing script path, but that is kludge). More thought warranted.&lt;br /&gt;
&lt;br /&gt;
- --[[User:Caveman|Caveman]] 12:02, 3 December 2005 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Caveman</name></author>
		
	</entry>
</feed>