Policy-Based Access Control (PBAC)
GPTKB entity
Statements (49)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Access Control System
|
gptkbp:abbreviation |
gptkb:PBAC
|
gptkbp:alternativeName |
Policy-based access management
|
gptkbp:canBe |
Decentralized
Manual Automated Centralized |
gptkbp:component |
gptkb:Policy_Administration_Point_(PAP)
gptkb:Policy_Decision_Point_(PDP) gptkb:Policy_Enforcement_Point_(PEP) gptkb:Policy_Information_Point_(PIP) |
gptkbp:contrastsWith |
gptkb:Role-Based_Access_Control_(RBAC)
gptkb:Attribute-Based_Access_Control_(ABAC) |
gptkbp:controls |
Access to resources
|
gptkbp:enables |
Regulatory compliance
Contextual access Dynamic access control Fine-grained access control Granular permissions Location-based access Real-time access decisions Risk-based access Separation of duties Time-based access |
gptkbp:expressedIn |
Complex business rules
|
gptkbp:focusesOn |
Policy enforcement
Policy evaluation |
gptkbp:governedBy |
Access policies
|
https://www.w3.org/2000/01/rdf-schema#label |
Policy-Based Access Control (PBAC)
|
gptkbp:policy |
Conditional policies
Contextual policies Dynamic policies |
gptkbp:relatedStandard |
gptkb:XACML
|
gptkbp:relatedTo |
Zero Trust security
Data-centric security |
gptkbp:supports |
Auditing
Scalability Delegation Context-aware access Dynamic decision-making |
gptkbp:usedBy |
Government agencies
Cloud service providers Large organizations |
gptkbp:usedIn |
gptkb:Identity_and_access_management_(IAM)
Cloud computing Enterprise security |
gptkbp:uses |
Policies to determine access
|
gptkbp:bfsParent |
gptkb:Role-Based_Access_Control_(RBAC)
|
gptkbp:bfsLayer |
6
|