
low-latency
+12

Mar 13, 2026
•
16 min read
authz
+5

Jan 30, 2026
•
22 min read
Series: Building Enma — From Rules to Relations Part 12 of 12: Freezing semantics so independent implementations converge
authz
+5

Jan 30, 2026
•
14 min read
Series: Building Enma — From Rules to Relations Part 11B of 12: Operational concerns for revision-based authorization
authz
+5

Jan 29, 2026
•
12 min read
Series: Building Enma — From Rules to Relations Part 11A of 12: Snapshot isolation for distributed authorization
authz
+5

Jan 1, 2026
•
13 min read
Series: Building Enma — From Rules to Relations Part 10B of 12: Bounded evaluation prevents resource exhaustion
authz
+5

Dec 28, 2025
•
12 min read
Series: Building Enma — From Rules to Relations Part 10A of 12: When things go wrong, deny access
authz
+5

Dec 18, 2025
•
27 min read
Series: Building Enma — From Rules to Relations Part 9 of 12: When two evaluators must always agree
authz
+5

Dec 12, 2025
•
24 min read
Series: Building Enma — From Rules to Relations Part 8 of 12: When all tuples must obey mandatory policies
authz
+5

Nov 27, 2025
•
23 min read
Series: Building Enma — From Rules to Relations Part 7A of 12: When access requires multi-predicate conditions and dynamic computations
authz
+4

Nov 20, 2025
•
23 min read
Series: Building Enma — From Rules to Relations Part 6: When permissions depend on attribute matching between users and resources
authz
+5

Nov 15, 2025
•
6 min read
A deep technical journey through modern authorization: RBAC → ReBAC → ABAC → Zanzibar.
authz
+4

Nov 13, 2025
•
27 min read
Series: Building Enma — From Rules to Relations Part 5: When permissions depend on context, not just identity
authz
+3

Nov 6, 2025
•
19 min read
Series: Building Enma — From Rules to Relations. Part 4: When permissions flow across object boundaries
authz
+3

Oct 30, 2025
•
23 min read
Series: Building Enma — From Rules to Relations Part 3: When permissions depend on object relationships, not global roles
authz
+4

Oct 22, 2025
•
9 min read
Series: Building Enma — From Rules to Relations. Part 2: From direct permissions to role-based access control

Where milliseconds matter and boundaries are meant to be broken—HFT redefined.