Attribute-based access control: Difference between revisions

Content deleted Content added
Content marketing.
External links: Remove commercial ELs.
Line 134:
 
== External links ==
* [https://axiomatics.com/resources/reference-library/attribute-based-access-control-abac What is Attribute-Based Access Control?]
* [http://csrc.nist.gov/projects/abac/ ATTRIBUTE BASED ACCESS CONTROL (ABAC) - OVERVIEW]
* [https://link.springer.com/chapter/10.1007%2F978-3-642-31540-4_4 Unified Attribute Based Access Control Model (ABAC) covering DAC, MAC and RBAC]
* [http://profsandhu.com/dissert/Dissertation_Xin_Jin.pdf Attribute Based Access Control Models (ABAC) and Implementation in Cloud Infrastructure as a Service]
* [https://f5.com/about-us/blog/articles/abac-not-rbac-welcome-to-the-iot-world-of-contextual-security ABAC not RBAC: Welcome to the (IoT) World of Contextual Security, 2015, Lori MacVittie]
* [https://plus.kuppingercole.com/article/mc71144/dynamic-authorization-management Market Compass: Dynamic Authorization Management, 2020, Graham Williamson]
 
[[Category:Access control]]