Ittay Eyal

featured article

A Taxonomy of Access Control

Photo of author
Dan Knauss
Once you know these states, you can assign probabilities of transitioning from one state to another (someone hacks your account and locks you out, you forgot your own password, etc.) and then build optimal security and reliability to deal with it. It’s a truly elegant way of conceptualizing the problem.
Latest articles
A2 Hosting
Omnisend
WordPress.com