Talk:Access control
![]() | This ![]() It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
![]() | This article is substantially duplicated by a piece in an external publication. Since the external publication copied Wikipedia rather than the reverse, please do not flag this article as a copyright violation of the following source:
|
![]() Archives (Index) |
This page is archived by ClueBot III.
|
Split into multiple articles?
[edit]I'm concerned that while physical and IT access control have similarities, they are very different domains. It's ok at a high-level, but once the article goes into specifics, the jump between the main sections is quite substantial. Anyone know the best way to reorganize this topic? — Preceding unsigned comment added by Zippydo121 (talk • contribs) 14:52, 26 October 2020 (UTC)
- I agree, I suggest sub paragraphs with "see main topic". Kerbless (talk) 15:32, 6 February 2023 (UTC)
- I agree Miparnisari (talk) 19:54, 1 May 2025 (UTC)
- Also, "The need-to-know principle" appears inside "physical security" but it applies to both Miparnisari (talk) 19:55, 1 May 2025 (UTC)
This might be useful
[edit]Information security#Access control Kerbless (talk) 15:31, 6 February 2023 (UTC)
Semi-protected edit request on 31 August 2024
[edit]![]() | This edit request has been answered. Set the |answered= parameter to no to reactivate your request. |
Access control is considered to be a significant aspect of privacy that should be further studied. Access control policy (also access policy) is part of an organization’s security policy. In order to verify the access control policy, organizations use an access control model.[1] Access control devices such as electronic locks can be more secure than traditional locks as they require authorized credentials, such as PIN codes or access cards, for entry. Shital12T (talk) 17:39, 31 August 2024 (UTC)
Done - Emphasized security of EAC via use of authorized credentials here, added ref to Further reading here as it didn't bare much on the first claim but is a solid survey of IoT AC. Tule-hog (talk) 23:37, 4 September 2024 (UTC)
References
- ^ Ouaddah, Aafaf; Mousannif, Hajar; Abou Elkalam, Anas; Ait Ouahman, Abdellah (2017-01-15). "Access control in the Internet of Things: Big challenges and new opportunities". Computer Networks. 112: 237–262. doi:10.1016/j.comnet.2016.11.007. ISSN 1389-1286.
JavaScript
[edit]JavaScript and — Preceding unsigned comment added by 2601:447:CF83:FFF0:A0EC:C273:7D40:B79E (talk) 06:31, 16 February 2025 (UTC)
Semi-protected edit request on 20 March 2025
[edit]![]() | It is requested that an edit be made to the semi-protected article at Access control. (edit · history · last · links · protection log)
This template must be followed by a complete and specific description of the request, that is, specify what text should be removed and a verbatim copy of the text that should replace it. "Please change X" is not acceptable and will be rejected; the request must be of the form "please change X to Y".
The edit may be made by any autoconfirmed user. Remember to change the |
Subscription-Based Access Control (SBAC)
SBAC assigns access permissions based on a user’s subscription status, automating the process of granting, modifying, or revoking access as users subscribe, upgrade, downgrade, or cancel. This model is particularly relevant for SaaS businesses, where access to features, data, or services is directly tied to a user’s active plan. Unlike RBAC or ABAC, which define permissions based on roles or attributes, SBAC dynamically distributes roles and policies based on billing status, ensuring real-time access alignment.[1] 66.81.177.249 (talk) 09:53, 20 March 2025 (UTC)
Not done: it's not clear what changes you want to be made. Please mention the specific changes in a "change X to Y" format and provide a reliable source if appropriate. Where are you suggesting this be added? meamemg (talk) 16:01, 20 March 2025 (UTC)
- It's intended to be added to the section on Access Control models.
- Change the List of access control models to add the above section on Subscription-Based Access Control as number 13, as per the alphabetical order. 92.185.119.215 (talk) 10:03, 24 March 2025 (UTC)
- ^ "Subscription-based access control (SBAC): A smarter approach for SaaS". Veriam. Veriam. Retrieved 20 March 2025.
- C-Class level-5 vital articles
- Wikipedia level-5 vital articles in Society and social sciences
- C-Class vital articles in Society and social sciences
- C-Class Computer security articles
- High-importance Computer security articles
- C-Class Computer security articles of High-importance
- C-Class Computing articles
- Mid-importance Computing articles
- All Computing articles
- All Computer security articles
- C-Class Mass surveillance articles
- Low-importance Mass surveillance articles
- Start-Class military history articles
- Start-Class intelligence articles
- Intelligence task force articles
- Start-Class military science, technology, and theory articles
- Military science, technology, and theory task force articles
- Wikipedia semi-protected edit requests