Your author discusses four different access models, but there is a fifth that
is gaining interest, particularly in a cloud environment. Read through the TBAC
attachment:”sacmat08-task.pdf” (or find additional resources), then complete
the following for each of the five models:
- Provide a brief description of the model.
- Provide a scenario where the model would be the optimal choice for access
control, and why. - Provide a scenario where the model is the least optimal choice for access
control, and why.
Another link that may help
http://www.hightechinthehub.com/2011/08/task-based-access-control-in-the-cloud/