Askemos

Search results come in 4 columns. (…more…)

  • A leading "line" number. Linked to a specialised display. (Often a barely useful, basic navigation; except when there's a customized template registerd for the class definition.
  • 3 columns in order subject, predicate, object: Each a term, URL, text or picture. Any column matching the query, thereby returning relevance context for the actual match.

A match is either a sqlite full text match of search term with a resource or a numeric match of the s, p or o parameter of the query. (The latter is indicated by the corresponding columns having all this value.)

search results

25 ( ) from offset 0 out of 48

616 Request Dispatch Overview container member ### "Looking At" vs. "Changing" the World There's already the first thing to detail more: request which may change the network state will be replicated to all, or at least most, of the replica while r
626 Request Dispatch Overview container member Once the protocol has consummated, changes are committed to permanent memory and additional messages may be sent out to trigger further processing and eventually a result will sent back to the client
629 Request Dispatch Overview container member ## Summary The Askemos system does require to trust in any single third party. Nor does it require long term trust in any cryptographic mean to establish trust in factual assertions. Instead of rely
650 Non-Repudiation description > "Non-repudiation refers to a state of affairs where the > purported maker of a statement will not be able to successfully > challenge the validity of the statement or contract." > [wikipedia] Non-
1195 http://www.bricklin.com/200yearsoftware.htm description Dan Bricklin: > The structure and culture of a typical prepackaged software > company is not attuned to the long-term needs of society for > software that is part of its infrastructure. This essay >
1292 Which peers can learn data or vote on progress? see also ### "Looking At" vs. "Changing" the World There's already the first thing to detail more: request which may change the network state will be replicated to all, or at least most, of the replica while r
1414 Trusted system ↑ ... is defined by Prerequisite Knowledge
1415 Trusted system is subclass of System
1417 Trusted system alternative Single point of failure
1421 Trusted system see URL http://en.wikipedia.org/wiki/Trusted_system
1423 Current trusted system ↑ ... is defined by Askemos Terms
1424 Current trusted system is subclass of Trusted system
1426 Current trusted system coverage (spatial or temporal) The system trusted (believed in and authorised by) by a person at the moment of interaction.
1428 ## Request Coming In The following sketch outlines the first stage of request processing. Incoming requests from client programs such as (but not limited to) Web Browsers, WebDAV file systems etc. a coverage (spatial or temporal) Current trusted system
1445 Trusted system see also Subjective truth (Evidential and Perceivable)
1449 Subjective truth (Evidential and Perceivable) comment A system containing no trusted component except the individual observer.
1468 Heterogeneous Security subject (keyword) Trusted system
1470 Heterogeneous Security description Examples would include: * different encryption techniques to communicate among peers of a network * different means authentication for different links * use of various combinations of hardware, o
1596 http://ball.askemos.org kind/genre/type Current trusted system
1654 keywords&details subject (keyword) Trusted system
1662 Representative (Askemos) is a Current trusted system
1674 Once the protocol has consummated, changes are committed to permanent memory and additional messages may be sent out to trigger further processing and eventually a result will sent back to the client see also Privacy
1704 We use "trustworty" here for propositions, which do NOT rely on any trusted system. derived from Trusted system
1705 trustworthy description We use "trustworty" here for propositions, which do NOT rely on any trusted system.
1835 TrustedCode (BALL Local) comment control the local trusted system