Ch4- Access Control
Ch4- Access Control
Access Control
2
Access Control
An access matrix
10
Alternate
authorization
table
12
Many-to-many
relationship
between
users and roles
Role-users and
roles-object
access matrix
18
Role-Based
Access Control
Constraints
• Fairly recent
• Define authorizations that express conditions on
properties of both the resource and the subject
Each resource has an attribute (e.g., the subject that
created it)
A single rule states ownership privileges for the
creators
• Strength: its flexibility and expressive power
• Considerable interest in applying the model to
cloud services
23
Types Of Attributes
• Subject attributes
• Object attributes
• Environment attributes
24
Subject Attributes
Object Attribute
Environment Attributes
1. A subject requests
access to an object
2. AC is governed by a
set of rules (2a):
assesses the
attributes of subject
(2b), object (2c) and
env (2d)
3. AC grants subject
access to object if
authorized
28
ICAM
1. Connects digital identity
to individuals
4. Identity verification
of
individuals from
external
organizations
Summary