Skip to main content
Fig. 1 | EURASIP Journal on Information Security

Fig. 1

From: A new usage control protocol for data protection of cloud environment

Fig. 1

Traditional access control model. The technology stipulates whether the subject can access to the object through the authorization policy. There are three main strategies: discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC). All of them have been widely used in various fields of DRM. They are all based on the subject-object passive security model

Back to article page