Access Control Model: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| (One intermediate revision by the same user not shown) | |||
(No difference)
| |||
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| (One intermediate revision by the same user not shown) | |||
(No difference)
| |||
Formal presentations of the security policies enforced by AC systems, and are useful for proving theoretical limitations of systems. AC models bridge the gap in abstraction between policy and mechanism.
Source: NIST SP 800-192 | Category: