Statements (37)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Access_Control_System
|
| gptkbp:abbreviation |
gptkb:PBAC
|
| gptkbp:advantage |
scalability
flexibility complexity centralized management policy management overhead requires policy authoring expertise |
| gptkbp:alternativeName |
gptkb:Policy-Based_Access_Control
|
| gptkbp:component |
policy decision point
policy enforcement point policy administration point policy information point |
| gptkbp:contrastsWith |
gptkb:Role_Based_Access_Control
gptkb:Attribute_Based_Access_Control |
| gptkbp:controls |
access to resources
|
| gptkbp:designedFor |
information security
|
| gptkbp:enables |
fine-grained access control
|
| gptkbp:enforcedBy |
regulatory requirements
organizational policies business rules |
| gptkbp:policy |
gptkb:rulebook
constraints conditions obligations |
| gptkbp:relatedStandard |
gptkb:XACML
|
| gptkbp:relatedTo |
gptkb:Zero_Trust_Architecture
|
| gptkbp:supports |
compliance management
dynamic access control context-aware access control |
| gptkbp:usedIn |
cloud computing
enterprise systems IT security |
| gptkbp:uses |
policies
|
| gptkbp:bfsParent |
gptkb:Role_Based_Access_Control
|
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
Policy Based Access Control
|