Access control is a security service according to the International Standards Organization (ISO). It stands for the various access procedures ofusers, computers and applications to shared resources or transmission media. These resources include networks, computing power, peripherals, storage capacity, files or software be.
In user access control to directories, computers, and other resources, access to data and resources can be mandatory, as in Mandatory Access Control (MAC), user-determined, as in Discretionary Access Control (DAC), role-based, as in Role-Based Access Control (RBAC), or attribute-based, as in Attribute-Based Access Control (ABAC). In media access control, a distinction is made between random, stochastic access methods, the collision methods, token methods and reservation methods.
- In the headers of various network protocols there are special data fields for access control. For example, ATM has the Generic Flow Control (GFC) data field and the Token Ring protocol has the Access Control Field (ACF).
Informationen zum Artikel
|Englisch:||access control - AC|