Tom has led a research group in deciding upon the type of access control thatshould be used in the product their company is planning to develop. Which of thefollowing is the best reason why the group decided upon rule-based?
A.
It allows for access decisions to be based on identity and security labels
B.
It provides explicit access, which is necessary with the use of roles
C.
It has the best subject to object control pertaining to access decisions
D.
It allows for access decisions to be based on complex situations
Explanation:
Rule-based access allows a developer to define specific and detailed situations thatcontrols when a subject can or cannot access an object and what that subject can doonce access is granted. Rule-based access control has been used traditionally in MAC systems as an enforcement mechanism of the complex rules of access that MAC systems provide, but today rule-based access is being used in other types of systems and applications.