W3C
Extended Access Control Lists (EACL) Table-of-Contents Conclusions
Change-size

Interpreting different security policies


Security policy

Authorization certificate

privilege attributes

Extended ACL

control attributes

All-or-nothing nothing nothing
Identity-based user-id user-id
Role-, group-based role name/group name role name/group name
Multi-level security security level security classification

José Kahan

15 of 16