Difference between revisions of "Decentralized data security"
Jump to navigation
Jump to search
(Benkoo moved page Distributed security model to Computer security model) Tag: New redirect |
(Removed redirect to Computer security model) Tag: Removed redirect |
||
Line 1: | Line 1: | ||
This security model is based on the fact that many participants can exercise their choices in terms of authenticating identities and authorizing resource access without completely following a centralized policy or centralized decision makers. |
Revision as of 04:52, 4 April 2022
This security model is based on the fact that many participants can exercise their choices in terms of authenticating identities and authorizing resource access without completely following a centralized policy or centralized decision makers.