Friday 21st April, 2017
1:00pm to 1:50pm
There are various access control models, each with a specific intent and purpose. Determining the ideal model for an application can help ensure proper authorization to application resources. Each of the primary models will be covered, including the MAC, DAC, RBAC, and ABAC Access Control models. Examples, challenges, and benefits of each will be discussed to provide a further insight into which solution may best serve an application. Application sensitivity, regulations, and privacy may drive which model is selected.
PHP software engineer, UPHPU President, loves the outdoors, husband, and Dad bio from Twitter
Sign in to add slides, notes or videos to this session