This is a potential security issue, you are being redirected to https://csrc.nist.gov.
You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.
Formal presentations of the security policies enforced by AC systems, and are useful for proving theoretical limitations of systems. AC models bridge the gap in abstraction between policy and mechanism.
Sources:
NIST SP 800-192
See the identified Source document to understand each term-definition pair in its proper context.
Send inquiries about terminology to the Source's authors; NIST publications will usually include a contact email for that Source.
For other inquiries, such as comments about the Glossary's presentation and functionality, use this link.
See the Glossary homepage for more guidance.