In this article we propose a review of four major models of access control. There is a description of functioning principles of each model. Also a brief analysis of possible insider threats is presented. And we propose a possible fragmentation of the basic scenarios to specific threats.
access control, access control model, threat scenarios, insider
“Analiz modelei insaiderskikh ugroz v sotsialno-tekhnicheskikh sistemakh” [Analysis of models of insider threats in the socio-technical systems],
Information Processing Systems,