色在线免费视频-色综合91久久精品中文字幕-色综合久久久久综合99-色综合久久天天综合观看-色综合久久天天综合绕观看

-Language-
Attribute Based Access Control (ABAC) - overview
2017-01-03 11:16

The concept of Attribute Based Access Control (ABAC) has existed for many years. It represents a point on the spectrum of logical access control from simple access control lists to more capable role-based access, and finally to a highly flexible method for providing access based on the evaluation of attributes.

In November 2009, the Federal Chief Information Officers Council (Federal CIO Council) published the Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Plan v1.0, which provided guidance to federal organizations to evolve their logical access control architectures to include the evaluation of attributes as a way to enable access within and between organizations across the Federal enterprise. In December 2011, the FICAM Roadmap and Implementation Plan v2.0 took the next step of calling out ABAC as a recommended access control model for promoting information sharing between diverse and disparate organizations.


ABAC is a logical access control model that is distinguishable because it controls access to objects by evaluating rules against the attributes of the entities (subject and object) actions and the environment relevant to a request. Attributes may be considered characteristics of anything that may be defined and to which a value may be assigned. In its most basic form, ABAC relies upon the evaluation of attributes of the subject, attributes of the object, environment conditions, and a formal relationship or access control rule defining the allowable operations for subject-object attribute and environment condition combinations. All ABAC solutions contain these basic core capabilities to evaluate attributes and environment conditions, and enforce rules or relationships between those attributes and environment conditions. ABAC systems are capable of enforcing both Discretionary Access Control (DAC) and Mandatory Access Control (MAC) models. Moreover, ABAC systems can enable Risk-Adaptable Access Control (RAdAC) solutions, with risk values expressed as variable attributes.


The rules or policies that can be implemented in an ABAC model are limited only to the degree imposed by the computational language. This flexibility enables the greatest breadth of subjects to access the greatest breadth of objects without specifying individual relationships between each subject and each object. For example, a subject is assigned a set of subject attributes upon employment (e.g., Nancy Smith is a Nurse Practitioner in the Cardiology Department.). An object is assigned its object attributes upon creation (e.g., a folder with Medical Records of Heart Patients). Resources Objects may receive their attributes either directly from the creator or as a result of automated scanning tools. The administrator or owner of an object owner creates an access control rule to govern the set of allowable operations (e.g., all Nurse Practitioners in the Cardiology Department can View the Medical Records of Heart Patients). Adding to the flexibility of the logical access control model, attributes and their values may then be modified throughout the lifecycle of subjects, objects, and attributes without modifying each and every subject/object relationship. This provides a more dynamic access control capability as access decisions can change between requests when attribute values change.

Provisioning ABAC describes attributes to subjects and objects governed by an access control rule set that specifies what operations can take place, this capability enables object owners or administrators to apply access control policy without prior knowledge of the specific subject and for an unlimited number of subjects that might require access. As new subjects join the organization, rules and objects do not need to be modified. As long as the subject is assigned the attributes necessary for access to the required objects (e.g., all Nurse Practitioners in the Cardiology Department are assigned those attributes), no modifications to existing rules or object attributes are required. This benefit is often referred to as accommodating the external user and is one of the primary benefits of employing ABAC.

Over the past decade, vendors have begun implementing Attribute Based Access Control (ABAC)-like features in their security management and network operating system products, without general agreement as to what constitutes an appropriate set of ABAC features. Due to a lack of consensus on ABAC features, users cannot accurately assess the benefits and challenges associated with ABAC.

Stephanie Stephanie Stephanie Ellie Ellie Ellie Victoria Victoria Victoria Olivia Olivia Olivia Isabella Isabella Isabella Jayden Jayden Jayden Lucas Lucas Lucas Dylan Dylan Dylan Ryan Ryan Ryan Noah Noah Noah

Sweep the concern Yingze electronic official WeChat

x
Sample Apply
※ Please fill in your information, our company will deal with your problem as soon as possible.
主站蜘蛛池模板: 九九爱国产| 国产精品区牛牛影院| 波多野吉衣一区二区三区四区| 久久亚洲网| 欧美亚洲在线观看| 色视频网站人成免费| 亚洲国产99在线精品一区二区| 在线免费观看网站入口在哪| a级高清观看视频在线看| 一级毛片欧美一级日韩黄| 久久777国产线看是看精品| 久热精品男人的天堂在线视频| 日韩视频91| 日韩在线视频网址| 日韩高清免费在线观看| 中国一级黄色大片| 日韩美女毛片| 日本成人一区二区| 久草看片| 又大又粗进出白浆直流动态图 | 国内日本精品视频在线观看| 国产成人久久精品二区三区牛| 国产美女在线播放| 国产性videostv另类极品| 国产免费一区二区| 国产在线播放成人免费| 国产在线自在拍91精品黑人| 国产一级大片免费看| 国内精品视频在线播放一区| 欧美日韩一区二区三区视视频| 欧美大片毛片aaa免费看| 免费高清a毛片| 成年美女xx网站高清视频 | 亚洲欧美韩日| 亚洲国产91在线| 青青青国产免费手机视频在线观看| 色天使色婷婷丁香久久综合| 免费人成网站在线高清| 久久精品嫩草影院免费看| 国产欧美日韩精品第一区| 99热精品国产三级在线观看|