CHAPTER
12 Authorization
Overview
• 12.1.1 Discretionary Access Control
• 12.1.2 Mandatory Access Control
• 12.1.4 Identity-Based Access Control
• 12.1.5 Attribute-Based Access Control
• 12.2.1 User Attributes and Privilege Assignment
• 12.2.2 Resource Attribute Assignment
• 12.2.3 Attribute Collection and Aggregation
• 12.2.5 Attribute Distribution
• 12.3 Digital Policy Management
Get Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.