翻訳と辞書
Words near each other
・ Atomic (EP)
・ Atomic (magazine)
・ Atomic (song)
・ Atomic 7
・ Atomic absorption spectroscopy
・ Atomic Age
・ Atomic Age (comics)
・ Atomic Age (design)
・ Atomic Aggressor
・ Atomic and molecular astrophysics
・ Atomic Antelope
・ Atomic Aquatics
・ Atomic Arena
・ Atomic Attack
・ ATOMIC Authoring Tool
Atomic authorization
・ Atomic battery
・ Atomic Battle Dragons
・ Atomic beam
・ Atomic Betty
・ Atomic Betty (video game)
・ Atomic Bitchwax I
・ Atomic Bitchwax II
・ Atomic Bomb (album)
・ Atomic Bomb Casualty Commission
・ Atomic bomb literature
・ Atomic Bomb! Band
・ Atomic Bomberman
・ Atomic bombings of Hiroshima and Nagasaki
・ Atomic Brain Invasion


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Atomic authorization : ウィキペディア英語版
Atomic authorization
Atomic authorization is the act of securing authorization rights independently from the intermediary applications to which they are granted and the parties to which they apply.〔http://mason.gmu.edu/~jdilles/AtomicAuthorization2.pdf (Retrieved 16 July 2009)〕 More formally, in the field of computer security, to atomically authorize is to define policy that permits access to a specific resource, such that the authenticity of such policy may be independently verified without reliance on the application that enforces the policy or the individuals who use the application. Resources include access to individual data, computer programs, computer hardware, computer networks, and physical access.
==Traditional vs. atomic authorization==
In traditional (non-atomic) authorization, policy is defined and secured at an application level. That is, outside the context of the application, there is no mechanism to verify the legitimacy of traditional authorization policy. Atomic authorization requires a trusted third party to issue authorization policy with a cryptographic guarantee of integrity. Because it is secured independently of the application which use it, atomic authorization policy is equivalent in strength to strong authentication policy.
For an application using strong (N-factor) authentication, traditional authorization techniques pose a security vulnerability. The application must rely upon technologies like database queries or directory lookups, which are protected using single-factor authentication, for authorization information and management. Any application specific hardening of non-atomic authorization methods increases the complexity of identity management and issuing credentials, but does not further legitimize the authorization decisions that the application makes.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Atomic authorization」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.