-
MAC – Mandatory Access Control
MAC – Mandatory Access Control is a security model to enforce restrictions on access to resources based on predefined rules and policies.
-
Access Control – Types
Access Control – Types is a security technique that regulates who or what can view or use resources in a computing environment. (to be continued…)
-
Granularity
Granularity defines the size of each component, part, or module in a distributed system.
-
Modularity
Modularity is the name given, to the process of defining the components, parts, or modules into which a system or software can be divided.
-
Modularity vs Granularity
Modularity vs. Granularity Modularity Granularity (To be continued…)
-
Active-Passive Pattern
Active-Passive Pattern is a design pattern that aims to improve the availability, scalability, and performance of distributed systems. The active partition can replicate, in near real-time, the transactions.The active partition can use backup and restore strategies (check the RTO and RPO).
-
Publisher-Subscriber
Publisher-Subscriber is a design pattern that allows multiple components of a system to communicate asynchronously and decouple their dependencies.
-
Throttling
Throttling is a technique that limits the number of requests or data that a server can handle in a given time period.
-
Hybrid Encryption
Hybrid Encryption is a cryptographic approach that combines the benefits of both symmetric and asymmetric encryption.
-
Data in Architecture
Data In Architecture