Content deleted Content added
m layout |
m →See also: cap, alpha |
||
Line 12:
{{columns-list|2|
* [[Access control list]]
* [[Attribute-
* [[Bell-La Padula model]]▼
* [[Biba Model]]▼
* [[Capability-based security]]▼
* [[Computer security model]]▼
* [[Context-based access control]] (CBAC)
* [[Discretionary access control]] (DAC)
* [[Graph-based access control]] (GBAC)
* [[Location-based authentication]]▼
* [[Mandatory access control]] (MAC)
* [[Organisation-based access control]] (OrBAC)
* [[Risk-based authentication]]▼
* [[Role-based access control]] (RBAC)
* [[RSBAC|Rule-set-based access control (RSBAC)]]
▲* [[Capability-based security]]
▲* [[Location-based authentication]]
▲* [[Risk-based authentication]]
▲* [[Bell-La Padula model]]
▲* [[Biba Model]]
▲* [[Computer security model]]
}}
== References ==
{{reflist}}
|