Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

dynamic right). Now that the basic authorization rules are understood, it is important to consider the resources which are accessible. They can be of various forms, from documents to specific actions. As far as documents are concerns, some persons may be authorized to read, write, a document, while others are authorized to sign. For actions, some may be able to start them, or stop them, and others may be authorized to carry them. All of this, of course, may be done within specified limits. It can be a time limit, or a number of times, or a period, for example. So as we see, there are many rights that can be set by policy and that are the object of authorization mechanisms. In fact, there is also yet another level, which is the authorization to change the policy itself, yet another level of details using in fact the same authorization mechanisms, but taking as the resource affected the actual policy framework.

Finally, the last leg of access mechanisms is accounting, in a broad sense. Not only are we concerned about particular prices that can be associated with each authorization level and activity, but also about the practices of logging entries, keeping history, and more generally, providing mechanisms to trace, value, and record authorization activities.

Now, the examples we have given were mostly associated with a person accessing a computer, with the computer performing authentication, authorization and accounting. Actually, the mechanisms are exactly the same for a computer accessing a computer. While the computer is not requested to provide biometric iris scans at this point, it has to provide the proof of its identity just like humans do. It’s just that this identity is established by different institutions than for humans. All computers in the world access the network through a network card. And every network card in the world has a number associated with it at manufacture, a unique number called a MAC address (MAC stands for Media Access Control), delivered by the famous Institute of Electrical and Electronics Engineers (IEEE). Here again, we have a trusted institution providing identity to an entity, in this case a computer. However, at this time, there is no mechanism to formally assure that the MAC address given is a bona fide number by questioning the IEEE, just like we described it earlier for human identity. So computer authentication at that level cannot really be trusted, and in fact, secure applications are cognizant of that and use multiple means of authentication to not be dependant on that one alone.

As we said, computers and humans go through the same access mechanisms. This is not surprising, because humans are not directly connected to computers (with some rare exceptions), so they are actually accessing computers via devices and systems that are themselves computer parts or full-computers. So in the end, it’s all computers talking to each other, albeit with some representing humans, and some representing just themselves.

Content model

As we mentioned earlier, we don’t know of an existing, widely accepted, encompassing content model theory, so we’ve attempted to deal with the pieces that exist, and tried to put them together into a coherent whole. If that constitutes an acceptable content theory, then here we have it. Otherwise, we’ll have to wait until either we discover that one exists but that we are not aware of it, or some academic constituency will build around the project of writing a better one than ours. Now, whereas in our earlier discussion we had to elaborate a classification of content based on our understanding of the subject from our observation of social practices, here we are going to complement our earlier work by looking at it from an easier perspective, that of the computer. What makes the perspective easier is that with the computer, we can reverse engineer every piece

206

6 The Shrine of Content

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)