Access Control Model: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
(No difference)
| |||
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
(No difference)
| |||
Formal presentations of the security policies enforced by AC systems, and are useful for proving theoretical limitations of systems. AC models bridge the gap in abstraction between policy and mechanism.
Source: NIST SP 800-192 | Category: