diff options
Diffstat (limited to 'doc/share/authz/ReBAC.md')
| -rw-r--r-- | doc/share/authz/ReBAC.md | 14 |
1 files changed, 9 insertions, 5 deletions
diff --git a/doc/share/authz/ReBAC.md b/doc/share/authz/ReBAC.md index 9e458fe..4c9deb7 100644 --- a/doc/share/authz/ReBAC.md +++ b/doc/share/authz/ReBAC.md @@ -2,7 +2,7 @@ > Authorization decisions are based on the relationship between the resource owner > and the resource accessor in a social network maintained by the protection -> system. +> system. [1] A Social Network System (SNS) maintains a social network for at least two reason: @@ -113,10 +113,14 @@ relationships can be "activated" simultaneously. ## Conclusion -Relationship-Based Access Control works best in application domains in which -binary relations are more natural for expressing authorization decisions than -unary relations (e.g., roles). +>Relationship-Based Access Control works best in application domains in which +>binary relations are more natural for expressing authorization decisions than +>unary relations (e.g., roles). ## See also -* [Relationship-Based Access Control: Protection Model and Policy Language by Philip W. L. Fong](https://cspages.ucalgary.ca/~pwlfong/Pub/codaspy2011.pdf) +* [Relationship-Based Access Control: Protection Model and Policy Language by Philip W. L. Fong][1] +* [Learning Relationship-Based Access Control Policies from Black-Box Systems][2] + +[1]: https://cspages.ucalgary.ca/~pwlfong/Pub/codaspy2011.pdf +[2]: https://dl.acm.org/doi/pdf/10.1145/3517121 |
