description
| - Data access control informed by applying reasoning and inference to roles that are used to
categorize actors seeking access (read, write, or execute) to a protected artifact on a network
(e.g., Intranet, World Wide Web, or Internet). This form of access control is more coarse-grained
relative to the Attributed-based access control alternative.
- Data access control informed by applying reasoning and inference to roles that are used to
categorize actors seeking access (read, write, or execute) to a protected artifact on a network
(e.g., Intranet, World Wide Web, or Internet). This form of access control is more coarse-grained
relative to the Attributed-based access control alternative.
- Data access control informed by applying reasoning and inference to roles that are used to
categorize actors seeking access (read, write, or execute) to a protected artifact on a network
(e.g., Intranet, World Wide Web, or Internet). This form of access control is more coarse-grained
relative to the Attributed-based access control alternative.
|