What is the correct terminology for enforcing access control by means of cryptography, or on a privileged list?
I have a server that enforces access control by means of cryptography, by not giving up data, or by a combination thereof.
By the former (cryptography), I mean: If a user requests some data, the server gives it in an encrypt… Continue reading What is the correct terminology for enforcing access control by means of cryptography, or on a privileged list?