Talk:Privilege revocation (computing)

Information theory vs Computer security
This article reads as though the term is equivalent/synonymous in both those fields. While in theory something (such as a key, ticked or certificate) may be revoked, without effecting system security policy. Further more benevolent processes (programs, spawn by users, etc) may revoke privileges for system reliability. However this may then pose a false sense of security in any observer of the system as to the privileges obtainable by the user (or process). —Preceding unsigned comment added by 62.195.107.55 (talk) 20:56, 28 June 2009 (UTC)