Review Article

A Survey on Zero Trust Architecture: Challenges and Future Trends

Table 3

Comparison of access control models.

NameModel introductionAdvantageLimit

Autonomous access control (DAC)User centered, allowing users to control file access without specifying rules in advanceIt is very flexible and can assign access rights between principals and objectsSystem maintenance and verification of safety principles are very difficult
Mandatory access control (MAC) [44]Users cannot customize permissions, and access control policies are managed in a centralized mannerLimitations of customer service DAC modelRely on trusted components
Role-based access control (RBAC) [29]Assign multiple roles to users and give them permissions and responsibilities as principalsCentral management with role members and ACSDifficult to establish initial role structure and lack of flexibility in IT technology
Organization-based access control (ORBAC)A more abstract control strategy. It is designed to address topics, objects, and actions. Policies determine which subjects have some actions to access certain objectsEliminate conflicts between security rulesVulnerabilities vulnerable to certain types of attacks
Task-based access control (TBAC) [31]Implement different access control policies for different workflows or different tasks that agree to workflowsWhen a task is introduced, it can be authorized actively and represent the change of task statusTasks and roles cannot be clearly separated, and passive access control and role hierarchy are not supported
Attribute-based access control (ABAC) [30]Approve or reject user requests based on any attributes of the user and selected attributes of objects that may be globally recognizedSubjects can access a wider range of objects and flexibly assign policies and security featuresIt is difficult to calculate the final permission set of a given user effectively
Policy-based access control (PBAC)A method of combining roles and attributes with logic to create flexible dynamic control strategiesFlexibility with fine-grained or coarse-grainedImperfect conflict detection mechanism
Use control (UCON)It contains three basic elements: subject, object, authority, and three other elements related to authorization: authorization rules, conditions, and obligationsSupport trust management and digital rights management, add subject and object attributes, and control them in the process of topic accessDelegation without permission description, explicit management description, and temporal description