Jim Gettys wrote: > Getting a decent authentication and authorization model is also > needed; This is an interesting field that X has left behind that's worth exploring. > But it is well understood that > applications level security may be more desirable in many > circumstances. Absolutely right. /Gian Filippo.