1.
2.
3.
4.
a.
i.
1. ACLs
2. capabilities
b.
i. lattice / security label
1.
o
2.
o
ii.
o
iii.
o
5.
a. autenticação
b.
c. confidencialidade
d.
e. não-repúdio
6.
a. Discretionary Access Control (DAC)
b. Mandatory Access Control (MAC)
c.
Role-Based
Access Control (RBAC)
1.
a. Simétrico
b.
2.
3.
4. PKI (Public Key Infrastructure)
1. Autenticação
2. Autorização
3.
4.
1. Kerberos Network Authentication Service
2.
Framework de
autenticação X.509
3.
GSS-API
(Generic Security Service Application Program
4.
SESAME
(Secure European System for Applications in a Multi-vendor Environment)
5. CORBASec (CORBA Security Service)
6.
JAAS
(Java Authentication and Authorization Service)
7.
GACL
(Generalized Access Control List)
8.
GAA-API
(Generic Authorization e Access Application Program
9.
RBAC
(Role-Based Access Control)
10.
SDSI
/ SPKI (Simple Distributed Security Infrastructure / Simple Public
Key Infrastructure)