Once an organization decides upon the access control model it will implement
(DAC,MAC, or RBAC), then it needs to look at the different possible access control
techniques that are available to work within these models and supplement their mechanisms.
The following sections explain some of the available access control techniques.
No comments:
Post a Comment