This document discusses access control and provides an overview of different access control models. It defines access control as the process of regulating use of system resources according to a security policy. The key points made are:
- Access control involves authentication, authorization, and auditing functions.
- Common access control policies include discretionary access control (DAC), mandatory access control (MAC), role-based access control (RBAC), and attribute-based access control (ABAC).
- DAC and MAC policies control access based on user identity and access rules or security labels/clearances. RBAC and ABAC control access based on user roles or attributes.
- ABAC provides a flexible approach that can implement other models as special