This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 55 lines
!!! Overview
[{$pagename}] ([ABAC]) is an [Access Control Model] when the values of values of Attributes for a [Digital Subject] determine [Permission].
Despite [ABAC]’s advantages and federal guidance that comprehensively defines [ABAC] and the considerations for enterprise deployment ([NIST Special Publication] [NIST.SP.800-162]), [adoption] has been slow. In response, the [National Cybersecurity Center of Excellence] ([NCCoE]), part of the [National Institute of Standards and Technology] ([NIST]), developed an example of an advanced access control system. (NIST Special Publication] [NIST.SP.1800-3])
!! [{$pagename}] [Examples]
[Examples] of [Access Control Models] that is consistent with ABAC is the [EXtensible Access Control Markup Language] ([XACML]). The [XACML] model employs elements such as:
* rules
* policies
* rule- and policy-combining algorithms
* attributes (subject, (resource) object, action and environment conditions), obligations, and advice.
[EXtensible Access Control Markup Language] reference architecture includes functions such as:
* [Policy Decision Points] ([PDPs])
* [Policy Enforcement Points] ([PEPs])
* [Policy Administration Points] ([PAPs])
* [Policy Information Points] ([PIPs])
Another example is the [Next Generation Access Control] ([ANSI 499], [NGAC]).
!! [RBAC vs ABAC]
The silly discussion of [RBAC vs ABAC].
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]