Attribute-based access control: Difference between revisions

Content deleted Content added
Elude
Tags: references removed Visual edit Mobile edit Mobile web edit
Done
Tags: Visual edit Mobile edit Mobile web edit
Line 132:
 
== External links ==
* [http://www.axiomatics.com/attribute-based-access-control.html What is attribute-based access control?]
* [http://csrc.nist.gov/projects/abac/ ATTRIBUTE BASED ACCESS CONTROL (ABAC) - OVERVIEW]
* [https://link.springer.com/chapter/10.1007%2F978-3-642-31540-4_4 Unified Attribute Based Access Control Model (ABAC) covering DAC, MAC and RBAC]
* [http://profsandhu.com/dissert/Dissertation_Xin_Jin.pdf Attribute Based Access Control Models (ABAC) and Implementation in Cloud Infrastructure as a Service]
* [https://f5.com/about-us/blog/articles/abac-not-rbac-welcome-to-the-iot-world-of-contextual-security ABAC not RBAC: Welcome to the (IoT) World of Contextual Security, 2015, Lori MacVittie]