How on earth can you put into LDAP extensions which read access controlYou don't need any extensions to the protocol for these functions.
when that is not defined. How does one deal with certficate paths and
using attribute name values which point into other contexts.
There's always an explicit or implicit information model behind anyoriented information systems and go to market that way - but one cannot design obvject oriented scaleable distributed database standards from an access or communications perspective (IMHO).
Please post links to your documents so I may follow them.It is easy to write a few pages for a new protocol and hype the name - its not so easy to write scaleable system design documents that the industry can follow..