Content deleted Content added
Serge10duke (talk | contribs) →See also: Added new related wiki pages and listed items in two columns. |
m layout |
||
Line 9:
Lattice based access control models were first formally defined by [[Dorothy E. Denning|Denning]] (1976); see also Sandhu (1993).
== See also ==▼
{{columns-list|2|▼
* [[Access control list]]▼
* [[Attribute-Based Access Control]] (ABAC)▼
* [[Context-based access control]] (CBAC)▼
* [[Discretionary access control]] (DAC)▼
* [[Graph-based access control]] (GBAC)▼
* [[Mandatory access control]] (MAC)▼
* [[Organisation-based access control]] (OrBAC)▼
* [[Role-based access control]] (RBAC)▼
* [[RSBAC|Rule-set-based access control (RSBAC)]]▼
* [[Capability-based security]]▼
* [[Location-based authentication]]▼
* [[Risk-based authentication]]▼
* [[Bell-La Padula model]]▼
* [[Biba Model]]▼
* [[Computer security model]]▼
}}▼
== References ==
{{reflist}}
Line 32 ⟶ 50:
| doi = 10.1109/2.241422
| url=http://www.winlab.rutgers.edu/~trappe/Courses/AdvSec05/access_control_lattice.pdf}}
▲== See also ==
▲{{columns-list|2|
▲* [[Access control list]]
▲* [[Attribute-Based Access Control]] (ABAC)
▲* [[Context-based access control]] (CBAC)
▲* [[Discretionary access control]] (DAC)
▲* [[Graph-based access control]] (GBAC)
▲* [[Mandatory access control]] (MAC)
▲* [[Organisation-based access control]] (OrBAC)
▲* [[Role-based access control]] (RBAC)
▲* [[RSBAC|Rule-set-based access control (RSBAC)]]
▲* [[Capability-based security]]
▲* [[Location-based authentication]]
▲* [[Risk-based authentication]]
▲* [[Bell-La Padula model]]
▲* [[Biba Model]]
▲* [[Computer security model]]
▲}}
[[Category:Computer security models]]
|