... | ... | @@ -17,7 +17,7 @@ PEP applies strong cryptography to all data stored in the system. Cryptographic |
|
|
|
|
|
## Trust reduction
|
|
|
|
|
|
PEP server components complement, check, and audit each others' actions. This ensures that data confidentiality cannot be compromised by breaching a single server. A similar "four eyes" principle applies to PEP's authorization system. Multiple administrators must cooperate to grant access, preventing any single administrator from being able to expose confidential data.
|
|
|
PEP is designed not to rely on any single party to safeguard data. Server components complement, check, and audit each others' actions. This ensures that data confidentiality cannot be compromised by breaching a single server. A similar "four eyes" principle applies to PEP's authorization system. Multiple administrators must cooperate to grant access, preventing any single administrator from being able to expose confidential data.
|
|
|
|
|
|
## Pseudonymization
|
|
|
|
... | ... | |