Tag: security
-
ABAC – Attribute Based Access Control
ABAC – Attribute Based Access Control is a type of access control model that uses attributes to determine whether a user should be granted access to a resource.
-
RBAC – Role Based Access Control
RBAC – Role Based Access Control is a security model to control access to resources based on the roles of individuals.
-
MAC – Mandatory Access Control
MAC – Mandatory Access Control is a security model to enforce restrictions on access to resources based on predefined rules and policies.
-
Access Control – Types
Access Control – Types is a security technique that regulates who or what can view or use resources in a computing environment. (to be continued…)
-
Hybrid Encryption
Hybrid Encryption is a cryptographic approach that combines the benefits of both symmetric and asymmetric encryption.
-
Data in Architecture
Data In Architecture
-
SSO – Single Sign On (1 of 2)
SSO – Single Sign On is a technology that allows users to access multiple applications or services with one set of credentials.
-
Asymmetric Encryption
Asymmetric Encryption is a cryptographic technique that allows two parties to communicate securely without sharing a secret key.