In this article we propose a review of four major models of access control. There is a description of functioning principles of each model. Also a brief analysis of possible insider threats is presented. And we propose a possible fragmentation of the basic scenarios to specific threats.
access control, access control model, threat scenarios, insider
"Analyz modelei ynsaiderskykh uhroz v sotsyalno-tekhnycheskykh systemakh" [Analysis of models of insider threats in the socio-technical systems],
Information Processing Systems,