Access control mechanisms in software
Developing a secure system requires robust authentication and authorization implementation. While authenticating users might not take much effort, the authorization aspect can get complicated. This is especially true if the application has various kinds of users. In this article, we will look into two major types of access control mechanisms, ABAC (also called CBAC) and […]