By Pete Su, Michael Yoon, Richard Li, @@ -70,8 +70,7 @@ (e.g. groups).
The next section will explore these facilities in the context of -the the particular programming idioms that we wish to -generalize.
Related Links
This design document should be read along with the design +the particular programming idioms that we wish to generalize.
Related Links
This design document should be read along with the design documents for the new groups system, subsites and the permissions system
@@ -177,7 +176,7 @@ OpenACS security model will defer to an object's context if there is no information about user X's permission to perform action Y on object Z.The context system forms the basis for the rest of the OpenACS -access control system, which is described in in two separate +access control system, which is described in two separate documents: one for the permissions system and another for the party groups system. The context system is also used to implement subsites.
@@ -996,8 +995,8 @@