Access Control
Discretionary Access Control (DAC)
identity-based access control
Claim-Based (CBAC)
Role (RBAC)
RBAC, role based access control
weakness is role explosion
Attribute (ABAC)
Policy (PBAC)
Mandatory (MAC)
cybersecurity
]
identity-based access control
RBAC, role based access control
weakness is role explosion
cybersecurity
]