An access control approach in which access is mediated based on attributes associated with subjects (requesters) and the objects to be accessed. Each object and subject has a set of associated attributes, such as location, time of creation, access rights, etc. Access to an object is authorized or denied depending upon whether the required (e.g., policy-defined) correlation can be made between the attributes of that object and of the requesting subject.
Source(s):
NIST SP 800-95
under Attribute Based Access Control
from
Common Criteria for Information Technology Security Evaluation (CC) Version 2.3, Part 2: Security Functional Components FDP_ACF.1
an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together. The policies can use any type of attributes (user attributes, resource attributes, environment attribute etc.
Source(s):
NIST SP 800-192