architecture IAST IAST – Interactive Application Security Testing identifies security vulnerabilities in application code while it’s running. Read More
architecture ABAC – Attribute Based Access Control ABAC – Attribute Based Access Control is a type of access control model that uses attributes to determine whether a Read More
architecture RBAC – Role Based Access Control RBAC – Role Based Access Control is a security model to control access to resources based on the roles of Read More
architecture RSBAC – Rule Set Based Access Control Rule-Set-Based Access Control is a type of access control mechanism that allows administrators to define and enforce access control policies Read More
architecture MAC – Mandatory Access Control MAC – Mandatory Access Control is a security model to enforce restrictions on access to resources based on predefined rules Read More
architecture Access Control – Types Access Control – Types is a security technique that regulates who or what can view or use resources in a Read More
architecture Hybrid Encryption Hybrid Encryption is a cryptographic approach that combines the benefits of both symmetric and asymmetric encryption. Read More
architecture SSO – Single Sign On (1 of 2) SSO – Single Sign On is a technology that allows users to access multiple applications or services with one set Read More
architecture JSON Web Token (JWT) JSON Web Token (JWT) is an open standard that defines a compact and self-contained way for securely transmitting information between Read More