Decentralized data security
Jump to navigation
Jump to search
This security model is based on the fact that many participants can exercise their choices in terms of authenticating identities and authorizing resource access without completely following a centralized policy or centralized decision makers.