Difference between revisions of "Decentralized data security"
Jump to navigation
Jump to search
(Benkoo moved page Distributed security model to Computer security model) Tag: New redirect |
m (Benkoo moved page Decentralized Data Security to Decentralized data security) |
||
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
This security model is based on the fact that many participants can exercise their choices in terms of authenticating identities and authorizing resource access without completely following a centralized policy or centralized decision makers. |
Latest revision as of 01:44, 12 April 2022
This security model is based on the fact that many participants can exercise their choices in terms of authenticating identities and authorizing resource access without completely following a centralized policy or centralized decision makers.