answersLogoWhite

0


Best Answer

the passive entity that is the target of an access request.

the active entity that initiates an access request.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What form of access control is based on access control lists that define which users can access objects?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about General History
Related questions

Can you get the circuit diagram of Fingerprint based access control system?

Yes. You can get the circuit diagram of Fingerprint based access control system.


Restricting access to files based on the indentity of the user or group is an example of which on what?

DAC - Discretionary Access Control.


Which acces control is based on a security labeling system?

Mandatory Access List


What is mean by the term Access control in information systems?

Access control is a system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system.


What is the full form of RBAC?

Role Based Access Control


Which access control model are you implementing?

RBACFingerprint Access Control System - TTAC01 model we are implementing it has a strictness entrance to a property, a building, or a room to authorized persons.Features Of Access Control : - # Eliminates administrative costs pertaining to conventional swipe cards and ID cards# Fingerprint matching with quick, accurate# Available for users up to 500/1000/1500# Can record up to 30,000 transactions


True or false electronic health record systems have the same access control requirements as paper-based record systems?

electronic health records have same access control requirements as paper based record system


Which type of access control gives every user and every object a label allowing for multi-level security policies?

Mandatory Access ControlAnswer Explanation: Mandatory Access Control is best described as a military-strength access control. Access permission is required before any form of system access is granted. All elements of a system are treated as objects. Every object is given a classification level. Classification levels are assigned based on the security required for each object. Users are called subjects. Each subject is assigned a level of privilege, known as a clearance level. Access permission is granted based on the comparison of subject clearance levels and object classification levels.


What are advantage of access control list?

An access control lists specifies the various users and what level of access they have. If you activate an access control list in a application, the various components of the application will be accessed based on the level of access permitted to them and the access level specified in the access control list for the currently logged in user.


Where can one get information for role based access control?

One can acquire more information regarding role based access control from a variety of sources, including ones public library, as well as online sources such as Juniper or Hytrust.


Why key performance areas and strategic control points are important to designing control system?

When designing a control system you have to focus on access. You want to limit access to information based on job titles and the need for information.


You are designing network access control so that remote users are limited to accessing the network during normal business hours only. Policies regarding user access apply to all users.?

Rule-based Access Control