Lattice-based access control: Difference between revisions

Content deleted Content added
See also: Added new related wiki pages and listed items in two columns.
m layout
Line 9:
Lattice based access control models were first formally defined by [[Dorothy E. Denning|Denning]] (1976); see also Sandhu (1993).
 
== See also ==
{{columns-list|2|
* [[Access control list]]
* [[Attribute-Based Access Control]] (ABAC)
* [[Context-based access control]] (CBAC)
* [[Discretionary access control]] (DAC)
* [[Graph-based access control]] (GBAC)
* [[Mandatory access control]] (MAC)
* [[Organisation-based access control]] (OrBAC)
* [[Role-based access control]] (RBAC)
* [[RSBAC|Rule-set-based access control (RSBAC)]]
* [[Capability-based security]]
* [[Location-based authentication]]
* [[Risk-based authentication]]
* [[Bell-La Padula model]]
* [[Biba Model]]
* [[Computer security model]]
}}
== References ==
{{reflist}}
Line 32 ⟶ 50:
| doi = 10.1109/2.241422
| url=http://www.winlab.rutgers.edu/~trappe/Courses/AdvSec05/access_control_lattice.pdf}}
 
== See also ==
{{columns-list|2|
* [[Access control list]]
* [[Attribute-Based Access Control]] (ABAC)
* [[Context-based access control]] (CBAC)
* [[Discretionary access control]] (DAC)
* [[Graph-based access control]] (GBAC)
* [[Mandatory access control]] (MAC)
* [[Organisation-based access control]] (OrBAC)
* [[Role-based access control]] (RBAC)
* [[RSBAC|Rule-set-based access control (RSBAC)]]
* [[Capability-based security]]
* [[Location-based authentication]]
* [[Risk-based authentication]]
* [[Bell-La Padula model]]
* [[Biba Model]]
* [[Computer security model]]
}}
 
[[Category:Computer security models]]