The document compares various access control models in information security, including Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and Rule-Based Access Control. Each model is characterized by its key features, example use cases, and advantages, such as flexibility, high security, reduced administrative overhead, and dynamic access capabilities. This comparison helps in understanding the strengths and applications of different access control mechanisms.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
9 views1 page
Access Control Models
The document compares various access control models in information security, including Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and Rule-Based Access Control. Each model is characterized by its key features, example use cases, and advantages, such as flexibility, high security, reduced administrative overhead, and dynamic access capabilities. This comparison helps in understanding the strengths and applications of different access control mechanisms.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 1
Comparison of Access Control
ModelModels in InformationCases Security
Access Control Control Key Features Example Use Advantages Mechanism Discretionary Owner- Users can set Personal Flexible, Access Control controlled permissions for their computers, easy to (DAC) own resources shared folders in implement Windows/Linux Mandatory Central Access determined by Government, High Access Control authority- predefined security military, classified security, (MAC) controlled labels (e.g., Top data handling prevents Secret, Confidential) unauthorize d data access Role-Based Role-based Users are assigned Enterprises, Reduces Access Control permissions roles, and permissions hospitals, administrati (RBAC) are assigned to roles financial ve institutions overhead, scalable Attribute-Based Attribute- Access based on Cloud computing, More Access Control based attributes (e.g., dynamic access flexible than (ABAC) policies location, device, user environments RBAC, clearance) dynamic policies Rule-Based Predefined Access based on Firewalls, VPNs, Consistent