Discretionary Access Control (DAC)

identity-based access control

Claim-Based (CBAC)

Role (RBAC)

RBAC, role based access control

weakness is role explosion

Attribute (ABAC)

Policy (PBAC)

Mandatory (MAC)