MAC | DAC | RBAC | ABAC | |
---|---|---|---|---|
Restrictiveness | High | Low | Medium | Medium |
Control | Low | High | Medium | Medium |
Flexibility | Low | Low | High | High |
Policy Maker | System | Owner | Roles | Attributes |
Advantages | Highly secure | Easy privilege configuration | Supports large enterprises; mitigates damage to data | Automated trust negotiation; improves upon RBAC |
Disadvantages | Low storage capacity; unable to modify security levels | Low storage capacity; unauthorized privileges can be granted | Requires investigation for defining attributes relevant to authorization decision | Privileges depend on role |