Main /
AccessorAuthenticationGoals for AuthenticationThe goal of authenticating accessor is to establish a relation of trust between the accessor, the accessor host, and the accessed service. Composing individually trustworthy accessors should in return give a trusted composition (*). It is not a goal to mandate new security protocols, but rather to bring together existing ones, like OAuth, to forge a strong security architecture for the accessor pattern. (*) Note that this is a rather bold statement. In order to achieve the above described goals, we need to put mechanisms and rules in place to
|