hypersign-protocol / whitepaper

2 stars 0 forks source link

Concept of ACL #63

Open Vishwas1 opened 2 years ago

Vishwas1 commented 2 years ago

The use of Access Control Lists allows owners/controllers of files the privilege of being able to revoke access post-facto. With only owners/controllers allowed to update the ACLs, whose authority is verified via cryptographic signatures on the Arcana blockchain, this model does not suffer from the ambient authority trap[9] or the confused deputy problem[10] prevalent in centralised ACL constructions.