Download presentation
Presentation is loading. Please wait.
Published byClifford Owens Modified over 8 years ago
1
Access Control Models Courtney Wirtz
2
~ Attribute Based Access Control ~ Discretionary Access Control ~ Mandatory Access Control ~ Role-based Access Control
12
~ Attribute Based Access Control ~ Discretionary Access Control ~ Mandatory Access Control ~ Role-based Access Control
14
Auerbach. “Handbook of Information Security”. Print. http://www.cccure.org/Documents/HISM/087-089.html http://www.cccure.org/Documents/HISM/087-089.html Axiomatics: Stockholm, Sweden. “Attribute Based Access Control (ABAC)”. Web. http://www.axiomatics.com/attribute-based- access-control.htmlhttp://www.axiomatics.com/attribute-based- access-control.html Ciampa, Mark. “Security + Guide to Network Security Fundamentals” 3 rd ed. Print. Course Technology: Cengage Learning. 2000 Clarkson, Michael. “Access Control ”. Cornell University. 2001 ed. http://www.cs.cornell.edu/courses/cs5430/2011sp/NL.accessCo ntrol.html http://www.cs.cornell.edu/courses/cs5430/2011sp/NL.accessCo ntrol.html InfoSystems Technology Inc. “ABAC Rule and Functions”. Web. http://rubix.com/cms/abac_rules http://rubix.com/cms/abac_rules
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.