[go: up one dir, main page]

0% found this document useful (0 votes)
198 views1 page

Access Control Comparison Table

The document compares four access control models: DAC, MAC, RBAC, and ABAC, highlighting their features such as control type, flexibility, security level, policy complexity, scalability, and real-time examples. DAC offers high flexibility but low security, while MAC is rigid with high security, RBAC provides moderate flexibility and good scalability, and ABAC is highly flexible with very high security. Each model is best suited for different environments, with DAC for small systems, MAC for military and defense, RBAC for enterprises, and ABAC for cloud and healthcare applications.

Uploaded by

sahasafi26
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
198 views1 page

Access Control Comparison Table

The document compares four access control models: DAC, MAC, RBAC, and ABAC, highlighting their features such as control type, flexibility, security level, policy complexity, scalability, and real-time examples. DAC offers high flexibility but low security, while MAC is rigid with high security, RBAC provides moderate flexibility and good scalability, and ABAC is highly flexible with very high security. Each model is best suited for different environments, with DAC for small systems, MAC for military and defense, RBAC for enterprises, and ABAC for cloud and healthcare applications.

Uploaded by

sahasafi26
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Comparison of Access Control Models:

DAC, MAC, RBAC, ABAC


Feature DAC MAC RBAC (Role- ABAC
(Discretionary (Mandatory Based Access (Attribute-
Access Control) Access Control) Control) Based Access
Control)
Access Based Owner’s System- User roles (job Attributes
On decision enforced positions) (user, resource,
security labels action,
environment)
Control Type User/owner Central Administrator Policy engine
controls access authority assigns roles evaluates
controls access and attributes and
permissions conditions
Flexibility High flexibility Very rigid Moderate Highly flexible
flexibility
Security Level Low to High (used for Moderate Very High
Moderate sensitive data)
Policy Simple Strict and Simple to Complex
Complexity inflexible moderate
Scalability Not suitable for Poor scalability Good scalability Excellent
large systems scalability
Real-Time User shares a Only 'Top Teacher role Finance
Example file with others Secret' users accesses grades employee
access sensitive accesses data
data during office
hours
Best Suited For Small/personal Military, Enterprises Cloud,
systems defense healthcare,
finance

You might also like