Describe how rule-based access controls can be implemented in the DAC model.

What will be an ideal response?


With DAC model rule-based access controls, access to information is granted based on a set of rules specified by a central authority. This is a DAC model because the individual user is the one who decides which rules apply. Role-based models can also be implemented under DAC if an individual system owner wants to create the rules for other users of that system or its data.

Computer Science & Information Technology

You might also like to view...

The unit used for measuring _____ is Hertz (Hz).

A. amplitude B. frequency C. sampling rate D. bit depth E. dynamic range

Computer Science & Information Technology

What does IDE stand for?

A) Independent Documentation Environment B) Independent Development Essentials C) Integrated Development Environment D) Integrated Documentation Essentials

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Computer games are a type of application software. 2. Scripting language code is embedded into an HTML document. 3. A programming language is a compiled language but a scripting language is not compiled before it is run. 4. Assembly language consists of a sequence of bits that are all zeros and ones. 5. PHP and ASP are dynamic programming languages that require the use of a debugger and an editor.

Computer Science & Information Technology

Base allows for data that has been typed into a Calc spreadsheet to be brought into a Base database

Indicate whether the statement is true or false

Computer Science & Information Technology