Difference between revisions of "Access Control"

From MgmtWiki
Jump to: navigation, search
(References)
(Solutions)
 
(4 intermediate revisions by the same user not shown)
Line 10: Line 10:
  
 
==Solutions==
 
==Solutions==
In general the wiki page on [[Authorization]] deals with [[Access Dontrol]] in an [[Identity Management]] ecosystem.
+
In general the wiki page on [[Authorization]] deals with [[Access Control]] in an [[Identity Management]] ecosystem.
  
 
In the following cases [[Access Control]] is addressed independently from [[Identity Management]].
 
In the following cases [[Access Control]] is addressed independently from [[Identity Management]].
  
Also note that the use of [[Verifiable Credentials]] can be tied to a one-time or [[Pseudonymous. ID]] thus avoiding any [[Identity Management]] between the holder and the verifier.
+
Also note that the use of [[Verifiable Credential]]s can be tied to a one-time or [[Pseudonym]] thus avoiding any [[Identity Management]] between the holder and the verifier.
  
===Access Control Encryption==
+
===Access Control Encryption===
or ACE is a scheme for using attribute encryption to acquire
+
or ACE is a scheme for using attribute encryption to acquire access.<ref>Made Sedaghat +1, ''Cross-Domain Attribute-Based Access Control Encryption'' in ''Cryptology and Network Security'' Springer ISBN 9783030925475</ref>
  
 
==References==
 
==References==
 +
<references />
 +
===Other Material===
 
* See wiki page on [[Access Token]].
 
* See wiki page on [[Access Token]].
 +
 +
[[Category: Authorization]]
 +
 +
  
 
[[Category: Glossary]]
 
[[Category: Glossary]]
 
[[Category: Authorization]]
 
[[Category: Authorization]]

Latest revision as of 11:39, 31 December 2021

Full Title or Meme

Authorization of Access to a Resource is the primary end goal for nearly all Identity Management.

Context

There are a variety of reasons to limit access to a resource on the web. The primary ones are:

  1. Embarrassment - there are some things we just don't want others to know about us.
  2. Financial - there are some things that we want to make a profit from releasing.

Problems

Solutions

In general the wiki page on Authorization deals with Access Control in an Identity Management ecosystem.

In the following cases Access Control is addressed independently from Identity Management.

Also note that the use of Verifiable Credentials can be tied to a one-time or Pseudonym thus avoiding any Identity Management between the holder and the verifier.

Access Control Encryption

or ACE is a scheme for using attribute encryption to acquire access.[1]

References

  1. Made Sedaghat +1, Cross-Domain Attribute-Based Access Control Encryption in Cryptology and Network Security Springer ISBN 9783030925475

Other Material