“…However, when faced with a multi-user, multi-strategy, fine-grained access control environment, RBAC model can not achieve a valid access control result. In order to overcome the shortcomings of the traditional role-based access control mechanism, scholars have launched a lot of research, and proposed multiple access control models, such as TBAC [9,10], T-RBAC [11], OASIS RBAC [12], UCON [13], ABAC [3], RBAC-DC [14], PDAC [15], HBAE [16,17] and etc. In particular, ABAC model introduces the concept of attribute, which makes up for deficiencies in traditional RBAC model, such as: the access control policy is not flexible enough to adapt to the dynamic changes of roles, and the coarse-grained authorization may influence its network adaptability.…”