Access Control

Access control includes identification, authorization, authentication, access approval, and audit.


Authorization involves the act of defining access-rights for subjects. An authorization policy specifies the operations that subjects are allowed to execute within a system.

  • Rule-based access control
  • Role-based access control
  • Attribute-based access control
  • Context-Based Access Control


  • Login/Identification

In computer security, logging in (or logging on or signing in or signing on) is the process by which an individual gains access to a computer system by identifying and authenticating themselves.