Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

At a previous job, one of my coworkers implemented a fairly complex role-based access control system by linking a prolog interpreter to our application. Our problem domain was...very unusual, so this was probably the best solution.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: