Review Article
SoK: Context and Risk Aware Access Control for Zero Trust Systems
Table 1
Abbreviations/definitions.
| ABAC | Attribute-based access control | ABE | Attribute-based encryption | AC | Access control | ACL | Access control list | BYOD | Bring your own device | CA-ABAC | Context-aware ABAC | CAAC | Context-aware access control | CASM | Context-aware security model | CP-ABE | Ciphertext policy based ABE | DAC | Discretionary access control | DMZ | Demilitarised zone | KP-ABE | Key policy-based ABE | MAC | Mandatory access control | NIST | National Institute of Standards and Technology | OT | Operational technology | PA | Policy administrator | PDP | Policy decision point | PE | Policy engine | PEP | Policy enforcement point | PKI | Public key encryption | QRACC | Quantified risk adaptive access control | RAdAC | Risk adaptive access control | RBAC | Role-based access control | SA-ABAC | Situation aware ABAC | SAM | Situation aware matrix | SASE | Secure access services edge | SDN | Software-defined networks | SD-WAN | Software-defined wireless area network | T-RBAC | Temporal RBAC, Trust-RBAC | UCON | Usage control | WBAN | Wireless body area network | ZT | Zero trust | ZTE | Zero trust edge | ZTN | Zero trust network |
|
|