Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

The term privacy has at least two distinct connotations. First, the term is applied to the concept of freedom of action. Within the purview of United States law, the historic Roe versus Wade decision by the United States Supreme Court brought this concept of privacy into focus. Defined through the penumbra of more specifically stated rights within the Constitution of the United States, the right to privacy illuminated by this decision bears directly on the power of the individual to completely control certain aspects of personal interactions that they may engage in, devoid of any control by the state or other individuals. The right of a woman to terminate a pregnancy, specifically early in the pregnancy, is held to be inviolate. However, as the terminus of the gestation period approaches, the decision finds that there may be compelling state interests that would serve to limit the afore-mentioned right to privacy. Consequently, the result is a right with a fuzzy boundary.

A second aspect of the concept of privacy is control over the possession or dissemination of information. Within the provision of an environment for transactions, we tend to reference this latter definition more often. That is, privacy most often refers to the limitation of the details of a transaction, or even to the conduct of a transaction itself, to specific, denominated entities privy to the information. As we will discuss in significantly more detail in Chapter 6, this brings into perspective the actual ownership, and hence control of, information.

For the moment, we will focus on the idea that privacy implies a limitation on the visibility of information or processes involved in a transaction.

In the military, “Who are you?” can be a death or life question. This is why soldiers wear uniforms, also why they don’t completely trust uniforms and try to complement them with specific signals, or other means to make sure that the person really is whomever he or she claims to be, for example by providing a password.

By definition, transactions involve the participation of various entities. Some entities might be inanimate, and some might be humans. Transactions effected between two or more entities are constrained by specifications of policy that are directly linked to the identity of entities that participate in the transactions. For the moment, we will ascribe a definition to the term identity as being the unique differentiation of one entity from all others. If we are able to establish the identity of an entity from time to time and/or from place to place we say that we can authenticate the identity of the entity.

Knowing that the soldier is one of your own is usually not enough. Some are authorized to give orders, some to take them and a very few to ignore them. In the military, one way to signal authorization is by patching grades on the uniform. Some officers are authorized to transmit messages on the radio of a certain importance, and only them.

Once the identity of various entities involved in a transaction has been authenticated, another policy characteristic of a transaction that can then be effected is to allow various capabilities to be ascribed to the authenticated identity. This allowance of capability is termed authorization. The two most common processes required within any policy infrastructure are the authentication of identities and the authorization of capabilities to those authenticated identities.

We all know the game in which a chain of children pass a message to each other from one end of the chain to the other, to discover to their astonishment that the message is totally garbled as it reaches its destination. Avoiding this is the purpose of integrity techniques. For example, we can use two chains of children and compare the messages at the end, or ask each child to repeat the

 

3 Environment

101

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)