This resource is no longer available
The Jericho Forum philosophy leads to access policies evolving from coarse, infrastructureoriented
statements to fine-grained business-oriented ones. But there’s a problem – there are
an awful lot more data items than there are firewalls. If each data item has to be individually
protected, how are we going to manage the enormous number of information access policies
we will need?