Atomic_Authorization
Atomic authorization is the act of securing authorization rights independently from the intermediary applications to which they are granted and the parties to which they apply.[1] More formally, in the field of computer security, to atomically authorize is to define policy that permits access to a specific resource, such that the authenticity of such policy may be independently verified without reliance on the application that enforces the policy or the individuals who use the application.[citation needed] Resources include access to individual data, computer programs, computer hardware, computer networks, and physical access.
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)
|