Once security procedures and safety systems have been implemented, one is still left with the question, "Who should be able to do what, when?" This becomes even more important with the increased access allowed by the World Wide Web. Traditional answers include trusting the users, "hiding" advanced features, and only supporting those commands that everyone needs. Permission-based solutions allow for greater flexibility, but with a substantial increase in time needed for configuration and management. I will examine the benefits and problems with these differing solutions as IPNS looks to find answers to allow us to move forward and better serve our user community.
Abstract File: abstract01050.txt
Here you can upload your paper. Papers are accepted in PDF format only.