There are several different models used within our industry for authorization
In case you've not seen it, From ABAC to ZBAC by Karp et al. is quite accessible and contrasts quite a few.
A variety of access control models have been developed over the years, each designed to address different aspects of the problem. This report will examine the strengths and weaknesses of the various approaches as applied in a cross domain services and as implemented in common SOA frameworks.
For further actions, you may consider blocking this person and/or reporting abuse
We're a place where coders share, stay up-to-date and grow their careers.
In case you've not seen it, From ABAC to ZBAC by Karp et al. is quite accessible and contrasts quite a few.