Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Special pages
Niidae Wiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Access control
(section)
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
=== Access control models === Access to accounts can be enforced through many types of controls.<ref>{{cite web|url=http://www.evolllution.com/media_resources/cybersecurity-access-control/|title=Cybersecurity: Access Control|date=4 February 2014|access-date=11 September 2017}}</ref> # [[Attribute-based access control|Attribute-based Access Control]] (ABAC) <br />An access control paradigm whereby access rights are granted to users through the use of policies which evaluate attributes (user attributes, resource attributes and environment conditions)<ref>{{Cite web |date=2014 |url=http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-162.pdf |title=SP 800-162, Guide to Attribute Based Access Control (ABAC) Definition and Considerations |publisher=NIST |access-date=8 December 2015 |url-status=dead |archive-url=https://web.archive.org/web/20160305222004/http://nvlpubs.nist.gov/nistpubs/specialpublications/NIST.sp.800-162.pdf |archive-date=5 March 2016 }}</ref> # [[Discretionary access control|Discretionary Access Control]] (DAC)<br />In DAC, the data owner determines who can access specific resources. For example, a system administrator may create a hierarchy of files to be accessed based on certain permissions. # [[Graph-based access control|Graph-based Access Control]] (GBAC)<br />Compared to other approaches like RBAC or ABAC, the main difference is that in GBAC access rights are defined using an organizational query language instead of total enumeration. # [[History-based access control|History-Based Access Control]] (HBAC)<br/>Access is granted or declined based on the real-time evaluation of a history of activities of the inquiring party, e.g. behavior, time between requests, content of requests.<ref>{{cite book |last=Schapranow |first=Matthieu-P. |date=2014 |title=Real-time Security Extensions for EPCglobal Networks |publisher=Springer |isbn=978-3-642-36342-9}}</ref> For example, the access to a certain service or data source can be granted or declined on the personal behavior, e.g. the request interval exceeds one query per second. # [[History-of-presence based access control|History-of-Presence Based Access Control]] (HPBAC)<br/>Access control to resources is defined in terms of presence policies that need to be satisfied by presence records stored by the requestor. Policies are usually written in terms of frequency, spread and regularity. An example policy would be "The requestor has made k separate visitations, all within last week, and no two consecutive visitations are apart by more than T hours."<ref>{{cite book |last1=Pereira |first1=Henrique G. G. |last2=Fong |first2=Philip W. L. |title=Computer Security β ESORICS 2019 |chapter=SEPD: An Access Control Model for Resource Sharing in an IoT Environment |volume=11736 |date=2019 |pages=195β216 |doi=10.1007/978-3-030-29962-0_10 |publisher=Springer International Publishing |language=en|series=Lecture Notes in Computer Science |isbn=978-3-030-29961-3 |s2cid=202579712 }}</ref> # [[Identity-based access control|Identity-Based Access Control]] (IBAC)<br />Using this network administrators can more effectively manage activity and access based on individual needs.<ref>{{citation|url=http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=/netahtml/PTO/search-bool.html&r=1&f=G&l=50&co1=AND&d=PTXT&s1=8,984,620.PN.&OS=PN/8,984,620&RS=PN/8,984,620|title=Identity and policy-based network security and management system and method|author1=Sonwane, Abhilash Vijay|author2=Mahadevia, Jimit Hareshkumau|author3=Malek, Sarfaraz Mohammedhanif|author4=Pandya, Sumit|author5=Shah, Nishit Shantibhai|author6=Modhwadiya, Rajesh Hardasbhai|date=17 March 2015|publisher=USPTO Patent Full-Text and Image Database|access-date=19 June 2022|archive-date=6 November 2015|archive-url=https://archive.today/20151106174748/http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=/netahtml/PTO/search-bool.html&r=1&f=G&l=50&co1=AND&d=PTXT&s1=8,984,620.PN.&OS=PN/8,984,620&RS=PN/8,984,620|url-status=bot: unknown}}</ref> # [[Lattice-based access control|Lattice-Based Access Control]] (LBAC)<br />A lattice is used to define the levels of security that an object may have and that a subject may have access to. The subject is only allowed to access an object if the security level of the subject is greater than or equal to that of the object. # [[Mandatory access control|Mandatory Access Control]] (MAC)<br />In MAC, users do not have much freedom to determine who has access to their files. For example, security clearance of users and classification of data (as confidential, secret or top secret) are used as security labels to define the level of trust. # [[Organisation-based access control|Organization-Based Access Control]] (OrBAC) <br /> OrBAC model allows the policy designer to define a security policy independently of the implementation<ref>{{cite web|url=http://orbac.org|title=OrBAC: Organization Based Access Control β The official OrBAC model website|website=orbac.org|access-date=11 September 2017|url-status=usurped|archive-url=https://web.archive.org/web/20170610205017/http://orbac.org/|archive-date=10 June 2017}}</ref> # [[Relationship-based access control|Relationship-Based Access Control]] (ReBAC)<br />A subject's permission to access a resource is defined by the presence of relationships between those subjects and resources. # [[Role-based access control|Role-Based Access Control]] (RBAC)<br />RBAC allows access based on the job title. RBAC largely eliminates discretion when providing access to objects. For example, a human resources specialist should not have permissions to create network accounts; this should be a role reserved for network administrators. # [[Rule-based access control|Rule-Based Access Control]] (RAC)<br />RAC method, also referred to as Rule-Based Role-Based Access Control (RB-RBAC), is largely context based. Example of this would be allowing students to use labs only during a certain time of day; it is the combination of students' RBAC-based information system access control with the time-based lab access rules. # [[Responsibility-based access control|Responsibility Based Access Control]] <br /> Information is accessed based on the responsibilities assigned to an actor or a business role<ref>{{cite web |last1=Feltus |first1=Christophe |last2=Petit |first2=MichaΓ«l |last3=Sloman |first3=Morris |title=Enhancement of Business IT Alignment by Including Responsibility Components in RBAC |url=http://ceur-ws.org/Vol-599/BUISTAL2010_Paper5.pdf |url-status=live |archive-url=https://web.archive.org/web/20160304063613/http://ceur-ws.org/Vol-599/BUISTAL2010_Paper5.pdf |archive-date=4 March 2016 |access-date=18 July 2014}}</ref>
Summary:
Please note that all contributions to Niidae Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Encyclopedia:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Search
Search
Editing
Access control
(section)
Add topic