15 lines
892 B
Markdown
15 lines
892 B
Markdown
|
# Préparation: Modèles d'autorisation
|
||
|
|
||
|
## Problématiques
|
||
|
|
||
|
- Quels sont les différents modèles d'autorisation aujourd'hui utilisés dans les applications informatiques ?
|
||
|
- Quels sont les avantages et inconvénients de ces différents modèles ?
|
||
|
|
||
|
## Bibliographie
|
||
|
|
||
|
- [Role Based Access Control - Wikipédia](https://en.wikipedia.org/wiki/Role-based_access_control)
|
||
|
- [Access Control List - Wikipédia](https://en.wikipedia.org/wiki/Access_control_list)
|
||
|
- [Attribute Based Access Control - Wikipédia](https://en.wikipedia.org/wiki/Attribute-based_access_control)
|
||
|
- [Role Based Acccess Control - NIST - 15th National Computer Security Conference](https://csrc.nist.gov/CSRC/media/Publications/conference-paper/1992/10/13/role-based-access-controls/documents/ferraiolo-kuhn-92.pdf)
|
||
|
- [Attribute Based Access Control](http://nvlpubs.nist.gov/nistpubs/specialpublications/NIST.sp.800-162.pdf)
|