This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 42 lines
!!! Overview
[{$pagename}] are models (or we prefer [frameworks]) for [Access Control].
[Policy Based Management System] is a generic [Framework] for [{$pagename}] which use a predefined [Access Control Policy]
[Privilege Management Infrastructure] ([PMI]) is a [framework] that could be used within an [Implementation] of a [{$pagename}].
There are many [Access Control] Models including: (but certainly NOT limited to)
* [Policy Based Management System] is a generic [Framework] for [{$pagename}] which use a predefined [Policy]
* [Role Based Access Control|RBAC] ([RBAC])
* [Attribute Based Access Control|ABAC] ([ABAC])
** [Context Based Access Control] ([CBAC])- Also referred to as [Risk Based Access Control|RiskBAC] are a form of [Attribute Based Access Control]
** [User Managed Access|User-Managed Access] ([UMA])
** [Dynamic Access Control] ([DAC])
** [Lattice Based Access Control] ([LBAC])
** [Adaptive Policy-based Access Management] ([APAM])
* [Mandatory Access Control]
* [Discretionary Access Control] ([DAC])
And we are sure there are others.
!! Not an [Implementation]
None of these models are an implementation of a [Access Control] system but rather "Models" or [Frameworks] that could be utilized for an [Architecture] [implementation].
Typically, each vendor will implement a hybrid of one or more [{$pagename}].
!! [Application] [{$pagename}]
[{$pagename}] is when the [Policy Enforcement Point] within the particular [application] or [Information Technology] system.
In most [Organizational Entities|Organizational Entity] the desire is for a more Centralized [{$pagename}]
!! [ACL]-based [{$pagename}]
[ACL]-based [{$pagename}], is when a [Digital Identity] requests an operation on a [Resource], the system first checks the [Access Control List] ([ACL]) for an applicable entry in order to decide whether the requested operation is [authorized].
!! [{$pagename}] [Microsoft Windows]
[Access Control Model-Microsoft Windows]
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]