Content deleted Content added
m Added external references to Policy Based Access Control for further context. |
No edit summary |
||
Line 5:
Although the concept itself existed for many years, ABAC is considered<ref>{{Cite web |url=http://www.axiomatics.com/attribute-based-access-control.html |title=Attribute Based Access Control (ABAC), ''axiomatics.com'' |accessdate=2016-07-05}}</ref> a "next generation" authorization model because it provides dynamic, context-aware and risk-intelligent access control to resources allowing access control policies that include specific attributes from many different information systems to be defined to resolve an authorization and achieve an efficient regulatory compliance, allowing enterprises flexibility in their implementations based on their existing infrastructures.
Attribute-based access control is sometimes referred to as '''policy-based access control'''<ref>[https://go.plainid.com/hubfs/Ebooks%20and%20Whitepapers%20and%20Reports/The%20Complete%20Guide%20to%20Authorization.pdf] Complete Guide to Authorization, 2019, Gal Helemski, ''PlainID'']. Retrieved on 2019-11-19.</ref> ('''PBAC''') or '''claims-based access control''' ('''CBAC'''),<ref>[http://genericiam.blogspot.co.uk/2015/10/rbac-first-abac-next-or-what.html RBAC first – ABAC next, or what?, 2015, Horst Walther, ''GenericIAM Blog'']. Retrieved on 2016-08-30.</ref> which is a Microsoft-specific term.<ref>[http://www.hpl.hp.com/techreports/2009/HPL-2009-30.pdf Karp, Alan, Harry Haury, and Michael Davis. "From ABAC to ZBAC: the evolution of access control models." ''International Conference on Information Warfare and Security''. Academic Conferences International Limited, 2010]. Retrieved on 2016-08-30.</ref> The key standards that implement ABAC are [[XACML]] and [[ALFA (XACML)]].
== Dimensions of attribute-based access control ==
|