157:
139:
167:
67:
49:
22:
259:
until the token itself is signed. Then the authorization can be atomic. On the back end database it is only an atomic authorization if a database compromise offers the attacker no ability to manipulate the authorization beyond removing it (failing closed). These would be helpful to graft into the description.
258:
I understand that atomic authorization implementations are done to prevent a single compromise from changing authorizations across multiple users, but I don't think that comes out in this article. It would also help to point out that SAML and XACML on the surface do not provide atomic authorization
236:
This article seems too thin. I would like to know how is this different from federated identity and saml assertions? How does this compare to what XOTA does and other extended universal authentication systems? Should sections be added about this? Does atomic authorization supersede other types of
294:
115:
309:
213:
121:
219:
289:
304:
91:
266:
189:
299:
74:
54:
243:
I think that a classic Bob, Eve and Alice scenario showing atomic authorization in an example would help (me, at least).
180:
144:
29:
270:
87:
35:
262:
244:
188:
on
Knowledge. If you would like to participate, please visit the project page, where you can join
90:
on
Knowledge. If you would like to participate, please visit the project page, where you can join
248:
156:
138:
172:
283:
166:
274:
252:
66:
48:
162:
83:
240:
Is there an atomic form of authentication that coincides with atomic auth?
79:
185:
15:
184:, a collaborative effort to improve the coverage of
78:, a collaborative effort to improve the coverage of
28:This article has not yet been rated on Knowledge's
218:This article has not yet received a rating on the
120:This article has not yet received a rating on the
8:
133:
43:
21:
19:
135:
45:
295:Unknown-importance Computing articles
7:
178:This article is within the scope of
72:This article is within the scope of
310:Unknown-importance science articles
34:It is of interest to the following
14:
165:
155:
137:
65:
47:
20:
100:Knowledge:WikiProject Computing
103:Template:WikiProject Computing
1:
290:Unassessed Computing articles
198:Knowledge:WikiProject Science
192:and see a list of open tasks.
94:and see a list of open tasks.
201:Template:WikiProject Science
305:Unassessed science articles
326:
220:project's importance scale
122:project's importance scale
275:01:45, 16 July 2010 (UTC)
253:17:57, 15 July 2010 (UTC)
217:
150:
119:
60:
42:
300:All Computing articles
88:information technology
75:WikiProject Computing
181:WikiProject Science
106:Computing articles
30:content assessment
265:comment added by
237:authorization?
234:
233:
230:
229:
226:
225:
132:
131:
128:
127:
317:
277:
206:
205:
204:science articles
202:
199:
196:
175:
170:
169:
159:
152:
151:
141:
134:
108:
107:
104:
101:
98:
69:
62:
61:
51:
44:
25:
24:
23:
16:
325:
324:
320:
319:
318:
316:
315:
314:
280:
279:
260:
203:
200:
197:
194:
193:
171:
164:
105:
102:
99:
96:
95:
12:
11:
5:
323:
321:
313:
312:
307:
302:
297:
292:
282:
281:
256:
232:
231:
228:
227:
224:
223:
216:
210:
209:
207:
190:the discussion
177:
176:
173:Science portal
160:
148:
147:
142:
130:
129:
126:
125:
118:
112:
111:
109:
92:the discussion
70:
58:
57:
52:
40:
39:
33:
26:
13:
10:
9:
6:
4:
3:
2:
322:
311:
308:
306:
303:
301:
298:
296:
293:
291:
288:
287:
285:
278:
276:
272:
268:
267:71.246.246.44
264:
255:
254:
250:
246:
241:
238:
221:
215:
212:
211:
208:
191:
187:
183:
182:
174:
168:
163:
161:
158:
154:
153:
149:
146:
143:
140:
136:
123:
117:
114:
113:
110:
93:
89:
85:
81:
77:
76:
71:
68:
64:
63:
59:
56:
53:
50:
46:
41:
37:
31:
27:
18:
17:
257:
242:
239:
235:
179:
73:
36:WikiProjects
261:—Preceding
284:Categories
97:Computing
84:computing
80:computers
55:Computing
263:unsigned
245:Shurdloo
195:Science
186:Science
145:Science
86:, and
32:scale.
271:talk
249:talk
214:???
116:???
286::
273:)
251:)
82:,
269:(
247:(
222:.
124:.
38::
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.