From d981d42202701b3bcd39399cb7f06e0825dff06d Mon Sep 17 00:00:00 2001 From: mo khan Date: Mon, 17 Mar 2025 11:42:15 -0600 Subject: docs: start reading another paper on rebac --- doc/share/authz/ReBAC.md | 14 +++++++++----- 1 file changed, 9 insertions(+), 5 deletions(-) (limited to 'doc/share/authz') diff --git a/doc/share/authz/ReBAC.md b/doc/share/authz/ReBAC.md index 9e458fe5..4c9deb77 100644 --- a/doc/share/authz/ReBAC.md +++ b/doc/share/authz/ReBAC.md @@ -2,7 +2,7 @@ > Authorization decisions are based on the relationship between the resource owner > and the resource accessor in a social network maintained by the protection -> system. +> system. [1] A Social Network System (SNS) maintains a social network for at least two reason: @@ -113,10 +113,14 @@ relationships can be "activated" simultaneously. ## Conclusion -Relationship-Based Access Control works best in application domains in which -binary relations are more natural for expressing authorization decisions than -unary relations (e.g., roles). +>Relationship-Based Access Control works best in application domains in which +>binary relations are more natural for expressing authorization decisions than +>unary relations (e.g., roles). ## See also -* [Relationship-Based Access Control: Protection Model and Policy Language by Philip W. L. Fong](https://cspages.ucalgary.ca/~pwlfong/Pub/codaspy2011.pdf) +* [Relationship-Based Access Control: Protection Model and Policy Language by Philip W. L. Fong][1] +* [Learning Relationship-Based Access Control Policies from Black-Box Systems][2] + +[1]: https://cspages.ucalgary.ca/~pwlfong/Pub/codaspy2011.pdf +[2]: https://dl.acm.org/doi/pdf/10.1145/3517121 -- cgit v1.2.3