Jump to content

Talk:Access control

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

Split into multiple articles?

[edit]

I'm concerned that while physical and IT access control have similarities, they are very different domains. It's ok at a high-level, but once the article goes into specifics, the jump between the main sections is quite substantial. Anyone know the best way to reorganize this topic? — Preceding unsigned comment added by Zippydo121 (talkcontribs) 14:52, 26 October 2020 (UTC)[reply]

I agree, I suggest sub paragraphs with "see main topic". Kerbless (talk) 15:32, 6 February 2023 (UTC)[reply]
I agree Miparnisari (talk) 19:54, 1 May 2025 (UTC)[reply]
Also, "The need-to-know principle" appears inside "physical security" but it applies to both Miparnisari (talk) 19:55, 1 May 2025 (UTC)[reply]

This might be useful

[edit]

Information security#Access control Kerbless (talk) 15:31, 6 February 2023 (UTC)[reply]

Semi-protected edit request on 31 August 2024

[edit]

Access control is considered to be a significant aspect of privacy that should be further studied. Access control policy (also access policy) is part of an organization’s security policy. In order to verify the access control policy, organizations use an access control model.[1] Access control devices such as electronic locks can be more secure than traditional locks as they require authorized credentials, such as PIN codes or access cards, for entry. Shital12T (talk) 17:39, 31 August 2024 (UTC)[reply]

 Done - Emphasized security of EAC via use of authorized credentials here, added ref to Further reading here as it didn't bare much on the first claim but is a solid survey of IoT AC. Tule-hog (talk) 23:37, 4 September 2024 (UTC)[reply]

References

  1. ^ Ouaddah, Aafaf; Mousannif, Hajar; Abou Elkalam, Anas; Ait Ouahman, Abdellah (2017-01-15). "Access control in the Internet of Things: Big challenges and new opportunities". Computer Networks. 112: 237–262. doi:10.1016/j.comnet.2016.11.007. ISSN 1389-1286.

JavaScript

[edit]

JavaScript and — Preceding unsigned comment added by 2601:447:CF83:FFF0:A0EC:C273:7D40:B79E (talk) 06:31, 16 February 2025 (UTC)[reply]

Semi-protected edit request on 20 March 2025

[edit]

Subscription-Based Access Control (SBAC)

SBAC assigns access permissions based on a user’s subscription status, automating the process of granting, modifying, or revoking access as users subscribe, upgrade, downgrade, or cancel. This model is particularly relevant for SaaS businesses, where access to features, data, or services is directly tied to a user’s active plan. Unlike RBAC or ABAC, which define permissions based on roles or attributes, SBAC dynamically distributes roles and policies based on billing status, ensuring real-time access alignment.[1] 66.81.177.249 (talk) 09:53, 20 March 2025 (UTC)[reply]

 Not done: it's not clear what changes you want to be made. Please mention the specific changes in a "change X to Y" format and provide a reliable source if appropriate. Where are you suggesting this be added? meamemg (talk) 16:01, 20 March 2025 (UTC)[reply]
It's intended to be added to the section on Access Control models.
Change the List of access control models to add the above section on Subscription-Based Access Control as number 13, as per the alphabetical order. 92.185.119.215 (talk) 10:03, 24 March 2025 (UTC)[reply]