January 2019
Beginner to intermediate
372 pages
11h 17m
English
Databases that are managed by centralized entities maintain the confidentiality of information by setting up authentication and authorization mechanisms. Only authenticated users who are authorized to access the resources will be able to perform operations on that information.
The security of data on the database is enhanced by using encryption techniques so that confidentiality is maintained even if the database is compromised.
A DLT is a public ledger that can be accessed by anyone without any authentication. A completely permissionless DLT doesn't enforce access control, and data will be accessible to everyone in the network. Data that is in the form of transactions has to be transparent in a decentralized ...