Access control methods in cryptography
Access control methods in cryptography are used to ensure that that authorized user gets access to the data or the resource. There are various access control methods. Some of the important access control methods are:
Discretionary access control: The access permission is based on the identity of the user and the discretion of the resource owner. The resource owner has the permission to change the access protocols. Less secure due to the possibility of potential misuse of the access protocols by the resouce owner
Mandatory access control: The access is granted by a central authority based on predefined security rules. The access is given based on various classifications. Used by military and other government organizations
Role based access control: The access is based on user role. Is highly flexible and simplistic. It simplifies the protocols by connection the role with the permission
Rule based access control: The access is based on the rule defined by the system administrator. Is similar to MAC but is more versatile. Used by organizations that have dynamic policies.
Attribute based access control: The access permissions are based on set of attributes such as user attributes, resource attributes, environmental factors.
Provides flexibility as multiple set of attributes are used to provide accessIdentitity based access control: The access is given based on the identity of the user. Can be used with DAC or with other access control models
Time based access control: The access is based on time periods. Used by organizations with strict operational hours and shift based working
Context based access control: The access control is based on the context such as device id, location, timezone. Used in mobile and cloud communications
Risk adaptive access control: The access is provided considering various risk factors. Used by banking system to decide whether to grant the loan considering various risk factors