Difference between revisions of "Access Control"
From MgmtWiki
m (Tom moved page Access to Access Control: ambiguity) |
(→References) |
||
Line 6: | Line 6: | ||
# Embarrassment - there are some things we just don't want others to know about us. | # Embarrassment - there are some things we just don't want others to know about us. | ||
# Financial - there are some things that we want to make a profit from releasing. | # Financial - there are some things that we want to make a profit from releasing. | ||
+ | |||
+ | ==Problems== | ||
+ | |||
+ | ==Solutions== | ||
+ | In general the wiki page on [[Authorization]] deals with [[Access Dontrol]] in an [[Identity Management]] ecosystem. | ||
+ | |||
+ | In the following cases [[Access Control]] is addressed independently from [[Identity Management]]. | ||
+ | |||
+ | Also note that the use of [[Verifiable Credentials]] can be tied to a one-time or [[Pseudonymous. ID]] thus avoiding any [[Identity Management]] between the holder and the verifier. | ||
+ | |||
+ | ===Access Control Encryption== | ||
+ | or ACE is a scheme for using attribute encryption to acquire | ||
==References== | ==References== |
Revision as of 10:28, 31 December 2021
Contents
Full Title or Meme
Authorization of Access to a Resource is the primary end goal for nearly all Identity Management.
Context
There are a variety of reasons to limit access to a resource on the web. The primary ones are:
- Embarrassment - there are some things we just don't want others to know about us.
- Financial - there are some things that we want to make a profit from releasing.
Problems
Solutions
In general the wiki page on Authorization deals with Access Dontrol in an Identity Management ecosystem.
In the following cases Access Control is addressed independently from Identity Management.
Also note that the use of Verifiable Credentials can be tied to a one-time or Pseudonymous. ID thus avoiding any Identity Management between the holder and the verifier.
=Access Control Encryption
or ACE is a scheme for using attribute encryption to acquire
References
- See wiki page on Access Token.