Sooner or later you have to deal with a security layer on top of/integrated into any info architecture. Here's a good, non-technical article in The Economist on various approaches: <http://www.economist.com/printedition/displayStory.cfm?Story_ID=1389553> ³Amateurs hack systems, professionals hack people.² Best, Ziya