0% found this document useful (0 votes)
9 views1 page

Access Control Models

The document compares various access control models in information security, including Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and Rule-Based Access Control. Each model is characterized by its key features, example use cases, and advantages, such as flexibility, high security, reduced administrative overhead, and dynamic access capabilities. This comparison helps in understanding the strengths and applications of different access control mechanisms.

Uploaded by

smujtba6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views1 page

Access Control Models

The document compares various access control models in information security, including Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and Rule-Based Access Control. Each model is characterized by its key features, example use cases, and advantages, such as flexibility, high security, reduced administrative overhead, and dynamic access capabilities. This comparison helps in understanding the strengths and applications of different access control mechanisms.

Uploaded by

smujtba6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Comparison of Access Control

ModelModels in InformationCases Security


Access Control Control Key Features Example Use Advantages
Mechanism
Discretionary Owner- Users can set Personal Flexible,
Access Control controlled permissions for their computers, easy to
(DAC) own resources shared folders in implement
Windows/Linux
Mandatory Central Access determined by Government, High
Access Control authority- predefined security military, classified
security,
(MAC) controlled labels (e.g., Top data handling prevents
Secret, Confidential) unauthorize
d data
access
Role-Based Role-based Users are assigned Enterprises, Reduces
Access Control permissions roles, and permissions hospitals, administrati
(RBAC) are assigned to roles financial ve
institutions overhead,
scalable
Attribute-Based Attribute- Access based on Cloud computing, More
Access Control based attributes (e.g., dynamic access flexible than
(ABAC) policies location, device, user environments RBAC,
clearance) dynamic
policies
Rule-Based Predefined Access based on Firewalls, VPNs, Consistent

You might also like