Access Control 38


Access Control 38 : Computer security: (5) Access control models: (5. 1) Attribute-based Access Control: In attribute-based access control (ABAC), access is granted not based on the rights of the subject associated with a user after authentication, but based on attributes of the user. The user has to prove so called claims about his attributes to the access control engine. An attribute-based access control policy specifies which claims need to be satisfied in order to grant access to an object. For instance the claim could be "older than 18". Any user that can prove this claim is granted access. Users can be anonymous as authentication and identification are not strictly required. One does however require means for proving claims anonymously. This can for instance be achieved using anonymous credentials. XACML (extensible access control markup language) is a standard for attribute-based access control. XACML 3. 0 was standardized in January 2013
No records Found
afaatim.com copyright © April 2016 Dr.K.R.Kamaal. All rights reserved