SlideShare a Scribd company logo
Exploring Access
Control Mechanisms
Which Fits Best in the Cloud?
1. Mandatory Access Control (MAC)
Principle: Access rights are enforced by a central authority
based on regulations and policies.
Components: Security Server, Data Server, Client
Process:
Usage: Typically used in highly secure environments like
government and military systems.
The client requests access.
The Security Server checks access rights according to
predefined rules.
The Security Server grants or denies access based on
these rules.
2. Discretionary Access Control (DAC)
Principle: The owner of the resource (Data Owner) controls the
access permissions.
Components: Data Owner, Data Server, User
Process:
Usage: Common in systems where data owners need flexibility
in managing access rights, such as in corporate environments.
The User requests access.
The Data Owner checks access rights.
Access is granted or denied based on the owner’s
discretion.
3. Role-Based Access Control (RBAC)
Principle: Access is granted based on the roles assigned to
users within an organization.
Components: User, Service Application, Roles
Process:
Usage: Widely used in business environments where users
need access to certain resources based on their job function.
The User makes an access request.
The Service Application checks the user's roles and
corresponding permissions.
Access is granted or denied based on the roles assigned.
4. Attribute-Based Access Control (ABAC)
Principle: Access is granted based on attributes (e.g., user
attributes, resource attributes, environment attributes).
Components: User, Policy Enforcement Point, Policy Decision
Point, Service Application, Attribute Server
Process:
Usage: Ideal for dynamic environments where access decisions
need to consider multiple factors, such as cloud environments.
The User requests access.
The Policy Enforcement Point evaluates the request.
The Policy Decision Point makes the access decision based
on policies and attributes provided by the Attribute Server.
Access is granted or denied based on a combination of these
attributes.
Exploring Access  Control Mechanisms.pdf
Ad

More Related Content

Similar to Exploring Access Control Mechanisms.pdf (20)

The Importance of Privilege Control for Server Security
The Importance of Privilege Control for Server SecurityThe Importance of Privilege Control for Server Security
The Importance of Privilege Control for Server Security
Bert Blevins
 
Bf25342345
Bf25342345Bf25342345
Bf25342345
IJERA Editor
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system security
G Prachi
 
Distributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloudDistributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloud
Chanakya Chandu
 
009 Authentication and Access Control.pptx
009 Authentication and Access Control.pptx009 Authentication and Access Control.pptx
009 Authentication and Access Control.pptx
AssadLeo1
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
shanmugamsara
 
Accountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudAccountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the Cloud
Editor IJCATR
 
Data base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access methodData base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access method
International Journal of Engineering Inventions www.ijeijournal.com
 
Iss lecture 6
Iss lecture 6Iss lecture 6
Iss lecture 6
Ali Habeeb
 
Alliance Compant Presentation
Alliance Compant PresentationAlliance Compant Presentation
Alliance Compant Presentation
Alliance Tech Solution Pvt Ltd
 
Defending broken access control in .NET
Defending broken access control in .NETDefending broken access control in .NET
Defending broken access control in .NET
Supriya G
 
Pp1t
Pp1tPp1t
Pp1t
Nitish Bhardwaj
 
Pp1t
Pp1tPp1t
Pp1t
Nitish Bhardwaj
 
Pp1t
Pp1tPp1t
Pp1t
Nitish Bhardwaj
 
Pp1t
Pp1tPp1t
Pp1t
Nitish Bhardwaj
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
Nitish Bhardwaj
 
Cm3 secure code_training_1day_access_control
Cm3 secure code_training_1day_access_controlCm3 secure code_training_1day_access_control
Cm3 secure code_training_1day_access_control
dcervigni
 
A Project to Automate Inventory Management in a Fast Food, Cas.docx
A Project to Automate Inventory Management in a Fast Food, Cas.docxA Project to Automate Inventory Management in a Fast Food, Cas.docx
A Project to Automate Inventory Management in a Fast Food, Cas.docx
ransayo
 
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENTAUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
Editor IJCATR
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
IJERA Editor
 
The Importance of Privilege Control for Server Security
The Importance of Privilege Control for Server SecurityThe Importance of Privilege Control for Server Security
The Importance of Privilege Control for Server Security
Bert Blevins
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system security
G Prachi
 
Distributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloudDistributed accountability for data sharing in cloud
Distributed accountability for data sharing in cloud
Chanakya Chandu
 
009 Authentication and Access Control.pptx
009 Authentication and Access Control.pptx009 Authentication and Access Control.pptx
009 Authentication and Access Control.pptx
AssadLeo1
 
Accountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudAccountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the Cloud
Editor IJCATR
 
Defending broken access control in .NET
Defending broken access control in .NETDefending broken access control in .NET
Defending broken access control in .NET
Supriya G
 
82ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp0182ugszwcqn29itkwai2q 140424034504-phpapp01
82ugszwcqn29itkwai2q 140424034504-phpapp01
Nitish Bhardwaj
 
Cm3 secure code_training_1day_access_control
Cm3 secure code_training_1day_access_controlCm3 secure code_training_1day_access_control
Cm3 secure code_training_1day_access_control
dcervigni
 
A Project to Automate Inventory Management in a Fast Food, Cas.docx
A Project to Automate Inventory Management in a Fast Food, Cas.docxA Project to Automate Inventory Management in a Fast Food, Cas.docx
A Project to Automate Inventory Management in a Fast Food, Cas.docx
ransayo
 
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENTAUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
Editor IJCATR
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
IJERA Editor
 

More from infosec train (20)

Understanding Top Cybersecurity Risk Metrics.pdf
Understanding Top Cybersecurity Risk Metrics.pdfUnderstanding Top Cybersecurity Risk Metrics.pdf
Understanding Top Cybersecurity Risk Metrics.pdf
infosec train
 
Ben 10 Security Day.pdf InfosecTrain
Ben  10  Security  Day.pdf  InfosecTrainBen  10  Security  Day.pdf  InfosecTrain
Ben 10 Security Day.pdf InfosecTrain
infosec train
 
Common Security Policies in Organizations.pdf
Common Security Policies in Organizations.pdfCommon Security Policies in Organizations.pdf
Common Security Policies in Organizations.pdf
infosec train
 
Top AI Global Regulations InfosecTrain .pdf
Top AI Global Regulations InfosecTrain .pdfTop AI Global Regulations InfosecTrain .pdf
Top AI Global Regulations InfosecTrain .pdf
infosec train
 
CEH Exam Practice Questions and Answers Part - 2.pdf
CEH Exam Practice Questions and Answers Part - 2.pdfCEH Exam Practice Questions and Answers Part - 2.pdf
CEH Exam Practice Questions and Answers Part - 2.pdf
infosec train
 
CEH Exam Practice Questions and Answers Part -1.pdf
CEH Exam Practice Questions and Answers Part -1.pdfCEH Exam Practice Questions and Answers Part -1.pdf
CEH Exam Practice Questions and Answers Part -1.pdf
infosec train
 
AI GRC Implementation Checklist-New.pdf
AI GRC Implementation  Checklist-New.pdfAI GRC Implementation  Checklist-New.pdf
AI GRC Implementation Checklist-New.pdf
infosec train
 
ISO 27001 2022 Audit Charter InfosecTrain.pdf
ISO 27001 2022 Audit Charter InfosecTrain.pdfISO 27001 2022 Audit Charter InfosecTrain.pdf
ISO 27001 2022 Audit Charter InfosecTrain.pdf
infosec train
 
Your CISSP Success Starts Here InfosecTrain.pdf
Your CISSP Success Starts Here InfosecTrain.pdfYour CISSP Success Starts Here InfosecTrain.pdf
Your CISSP Success Starts Here InfosecTrain.pdf
infosec train
 
Top Wireless Attacks and How to Prevent Them.pdf
Top Wireless Attacks and How to Prevent Them.pdfTop Wireless Attacks and How to Prevent Them.pdf
Top Wireless Attacks and How to Prevent Them.pdf
infosec train
 
Best AI Governance Principles InfosecTrain.pdf
Best AI Governance Principles InfosecTrain.pdfBest AI Governance Principles InfosecTrain.pdf
Best AI Governance Principles InfosecTrain.pdf
infosec train
 
Cloud Security Excellence CCSP Training.pdf
Cloud Security Excellence CCSP Training.pdfCloud Security Excellence CCSP Training.pdf
Cloud Security Excellence CCSP Training.pdf
infosec train
 
Top CompTIA Security+ Exam Practice Questions and Answers.pdf
Top CompTIA Security+ Exam Practice Questions and Answers.pdfTop CompTIA Security+ Exam Practice Questions and Answers.pdf
Top CompTIA Security+ Exam Practice Questions and Answers.pdf
infosec train
 
Top 20 DevSecOps Interview Questions.pdf
Top 20 DevSecOps Interview Questions.pdfTop 20 DevSecOps Interview Questions.pdf
Top 20 DevSecOps Interview Questions.pdf
infosec train
 
GDPR Assessment Checklist InfosecTrain.pdf
GDPR Assessment Checklist InfosecTrain.pdfGDPR Assessment Checklist InfosecTrain.pdf
GDPR Assessment Checklist InfosecTrain.pdf
infosec train
 
Achievers of the Month InfosecTrain .pdf
Achievers of the Month InfosecTrain .pdfAchievers of the Month InfosecTrain .pdf
Achievers of the Month InfosecTrain .pdf
infosec train
 
AWS vs. Azure vs. Google Cloud. pdf Infosec
AWS vs. Azure  vs. Google Cloud. pdf InfosecAWS vs. Azure  vs. Google Cloud. pdf Infosec
AWS vs. Azure vs. Google Cloud. pdf Infosec
infosec train
 
50 Most Asked Interview Questions for Data Protection Officer (DPO).pdf
50 Most Asked Interview Questions for Data Protection Officer (DPO).pdf50 Most Asked Interview Questions for Data Protection Officer (DPO).pdf
50 Most Asked Interview Questions for Data Protection Officer (DPO).pdf
infosec train
 
Most Important Event IDs in SOC .pdf
Most  Important  Event   IDs in SOC .pdfMost  Important  Event   IDs in SOC .pdf
Most Important Event IDs in SOC .pdf
infosec train
 
ISO IEC 42001 Lead Auditor Certification Training.pdf
ISO IEC 42001 Lead Auditor Certification Training.pdfISO IEC 42001 Lead Auditor Certification Training.pdf
ISO IEC 42001 Lead Auditor Certification Training.pdf
infosec train
 
Understanding Top Cybersecurity Risk Metrics.pdf
Understanding Top Cybersecurity Risk Metrics.pdfUnderstanding Top Cybersecurity Risk Metrics.pdf
Understanding Top Cybersecurity Risk Metrics.pdf
infosec train
 
Ben 10 Security Day.pdf InfosecTrain
Ben  10  Security  Day.pdf  InfosecTrainBen  10  Security  Day.pdf  InfosecTrain
Ben 10 Security Day.pdf InfosecTrain
infosec train
 
Common Security Policies in Organizations.pdf
Common Security Policies in Organizations.pdfCommon Security Policies in Organizations.pdf
Common Security Policies in Organizations.pdf
infosec train
 
Top AI Global Regulations InfosecTrain .pdf
Top AI Global Regulations InfosecTrain .pdfTop AI Global Regulations InfosecTrain .pdf
Top AI Global Regulations InfosecTrain .pdf
infosec train
 
CEH Exam Practice Questions and Answers Part - 2.pdf
CEH Exam Practice Questions and Answers Part - 2.pdfCEH Exam Practice Questions and Answers Part - 2.pdf
CEH Exam Practice Questions and Answers Part - 2.pdf
infosec train
 
CEH Exam Practice Questions and Answers Part -1.pdf
CEH Exam Practice Questions and Answers Part -1.pdfCEH Exam Practice Questions and Answers Part -1.pdf
CEH Exam Practice Questions and Answers Part -1.pdf
infosec train
 
AI GRC Implementation Checklist-New.pdf
AI GRC Implementation  Checklist-New.pdfAI GRC Implementation  Checklist-New.pdf
AI GRC Implementation Checklist-New.pdf
infosec train
 
ISO 27001 2022 Audit Charter InfosecTrain.pdf
ISO 27001 2022 Audit Charter InfosecTrain.pdfISO 27001 2022 Audit Charter InfosecTrain.pdf
ISO 27001 2022 Audit Charter InfosecTrain.pdf
infosec train
 
Your CISSP Success Starts Here InfosecTrain.pdf
Your CISSP Success Starts Here InfosecTrain.pdfYour CISSP Success Starts Here InfosecTrain.pdf
Your CISSP Success Starts Here InfosecTrain.pdf
infosec train
 
Top Wireless Attacks and How to Prevent Them.pdf
Top Wireless Attacks and How to Prevent Them.pdfTop Wireless Attacks and How to Prevent Them.pdf
Top Wireless Attacks and How to Prevent Them.pdf
infosec train
 
Best AI Governance Principles InfosecTrain.pdf
Best AI Governance Principles InfosecTrain.pdfBest AI Governance Principles InfosecTrain.pdf
Best AI Governance Principles InfosecTrain.pdf
infosec train
 
Cloud Security Excellence CCSP Training.pdf
Cloud Security Excellence CCSP Training.pdfCloud Security Excellence CCSP Training.pdf
Cloud Security Excellence CCSP Training.pdf
infosec train
 
Top CompTIA Security+ Exam Practice Questions and Answers.pdf
Top CompTIA Security+ Exam Practice Questions and Answers.pdfTop CompTIA Security+ Exam Practice Questions and Answers.pdf
Top CompTIA Security+ Exam Practice Questions and Answers.pdf
infosec train
 
Top 20 DevSecOps Interview Questions.pdf
Top 20 DevSecOps Interview Questions.pdfTop 20 DevSecOps Interview Questions.pdf
Top 20 DevSecOps Interview Questions.pdf
infosec train
 
GDPR Assessment Checklist InfosecTrain.pdf
GDPR Assessment Checklist InfosecTrain.pdfGDPR Assessment Checklist InfosecTrain.pdf
GDPR Assessment Checklist InfosecTrain.pdf
infosec train
 
Achievers of the Month InfosecTrain .pdf
Achievers of the Month InfosecTrain .pdfAchievers of the Month InfosecTrain .pdf
Achievers of the Month InfosecTrain .pdf
infosec train
 
AWS vs. Azure vs. Google Cloud. pdf Infosec
AWS vs. Azure  vs. Google Cloud. pdf InfosecAWS vs. Azure  vs. Google Cloud. pdf Infosec
AWS vs. Azure vs. Google Cloud. pdf Infosec
infosec train
 
50 Most Asked Interview Questions for Data Protection Officer (DPO).pdf
50 Most Asked Interview Questions for Data Protection Officer (DPO).pdf50 Most Asked Interview Questions for Data Protection Officer (DPO).pdf
50 Most Asked Interview Questions for Data Protection Officer (DPO).pdf
infosec train
 
Most Important Event IDs in SOC .pdf
Most  Important  Event   IDs in SOC .pdfMost  Important  Event   IDs in SOC .pdf
Most Important Event IDs in SOC .pdf
infosec train
 
ISO IEC 42001 Lead Auditor Certification Training.pdf
ISO IEC 42001 Lead Auditor Certification Training.pdfISO IEC 42001 Lead Auditor Certification Training.pdf
ISO IEC 42001 Lead Auditor Certification Training.pdf
infosec train
 
Ad

Recently uploaded (20)

How to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 WebsiteHow to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 Website
Celine George
 
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptxSCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
Ronisha Das
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
Sinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_NameSinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_Name
keshanf79
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
How to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POSHow to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POS
Celine George
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
Social Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsSocial Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy Students
DrNidhiAgarwal
 
How to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odooHow to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odoo
Celine George
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 
New Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxNew Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptx
milanasargsyan5
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
GDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptxGDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptx
azeenhodekar
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
Celine George
 
How to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 WebsiteHow to Subscribe Newsletter From Odoo 18 Website
How to Subscribe Newsletter From Odoo 18 Website
Celine George
 
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptxSCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
Ronisha Das
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
Sinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_NameSinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_Name
keshanf79
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
How to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POSHow to Manage Opening & Closing Controls in Odoo 17 POS
How to Manage Opening & Closing Controls in Odoo 17 POS
Celine George
 
Metamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative JourneyMetamorphosis: Life's Transformative Journey
Metamorphosis: Life's Transformative Journey
Arshad Shaikh
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
Social Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy StudentsSocial Problem-Unemployment .pptx notes for Physiotherapy Students
Social Problem-Unemployment .pptx notes for Physiotherapy Students
DrNidhiAgarwal
 
How to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odooHow to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odoo
Celine George
 
To study Digestive system of insect.pptx
To study Digestive system of insect.pptxTo study Digestive system of insect.pptx
To study Digestive system of insect.pptx
Arshad Shaikh
 
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Phoenix – A Collaborative Renewal of Children’s and Young People’s Services C...
Library Association of Ireland
 
New Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptxNew Microsoft PowerPoint Presentation.pptx
New Microsoft PowerPoint Presentation.pptx
milanasargsyan5
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
GDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptxGDGLSPGCOER - Git and GitHub Workshop.pptx
GDGLSPGCOER - Git and GitHub Workshop.pptx
azeenhodekar
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
How to track Cost and Revenue using Analytic Accounts in odoo Accounting, App...
Celine George
 
Ad

Exploring Access Control Mechanisms.pdf

  • 2. 1. Mandatory Access Control (MAC) Principle: Access rights are enforced by a central authority based on regulations and policies. Components: Security Server, Data Server, Client Process: Usage: Typically used in highly secure environments like government and military systems. The client requests access. The Security Server checks access rights according to predefined rules. The Security Server grants or denies access based on these rules.
  • 3. 2. Discretionary Access Control (DAC) Principle: The owner of the resource (Data Owner) controls the access permissions. Components: Data Owner, Data Server, User Process: Usage: Common in systems where data owners need flexibility in managing access rights, such as in corporate environments. The User requests access. The Data Owner checks access rights. Access is granted or denied based on the owner’s discretion.
  • 4. 3. Role-Based Access Control (RBAC) Principle: Access is granted based on the roles assigned to users within an organization. Components: User, Service Application, Roles Process: Usage: Widely used in business environments where users need access to certain resources based on their job function. The User makes an access request. The Service Application checks the user's roles and corresponding permissions. Access is granted or denied based on the roles assigned.
  • 5. 4. Attribute-Based Access Control (ABAC) Principle: Access is granted based on attributes (e.g., user attributes, resource attributes, environment attributes). Components: User, Policy Enforcement Point, Policy Decision Point, Service Application, Attribute Server Process: Usage: Ideal for dynamic environments where access decisions need to consider multiple factors, such as cloud environments. The User requests access. The Policy Enforcement Point evaluates the request. The Policy Decision Point makes the access decision based on policies and attributes provided by the Attribute Server. Access is granted or denied based on a combination of these attributes.