Talk:Fabric of Security

Untitled
Missed [Figure 1 entitled "Access Control Model of Protection"] (mentioned in section of Lampson's Protection Model) ?

Proposed Revisions
This article is relevant to the current cybersecurity environment but it's poorly written. And from what I can tell, portions of it were copied from the original contributor's academic research. I will do what I can to clean it up and improve it. Several cyber security companies, like Palo Alto Networks, use 'fabric' in their technical jargon. I believe at least a few of those companies' articles on Wikiepdia should link here, after a bit of clean up. I hope others help improve this article.Michael Martinez (talk) 16:01, 15 September 2021 (UTC)
 * So it looks like I dithered too long in preparing my proposed changes. Someone from the WikiProject Computer Security Assessment department removed the copyrighted content. I still think the article can be improved. I'll do a little more research and see if I can help out. I encourage any security industry professionals who see this page to consider helping.Michael Martinez (talk) 16:56, 4 October 2021 (UTC)
 * While I'd still like to contribute to this article, finding time to do so hasn't been easy. I've been searching for a good source that explains "federated security". I'm not sure but I think this would be an acceptable citation: The text appears to have been quoted on other sites. Butler_Lampson, who is referenced in the Fabric of Security article, worked for Microsoft in the 1990s. I cannot find a source attributing the definition provided on the Microsoft site to him.Michael Martinez (talk) 07:38, 13 November 2021 (UTC)
 * I think it would also be helpful to mention more up-to-date concepts, such as Gartner's Cybersecurity Mesh. I don't think that link would be an appropriate source but this is a new concept that Gartner appears to have introduced this year.Michael Martinez (talk) 07:38, 13 November 2021 (UTC)