Skip to main content
. Author manuscript; available in PMC: 2012 Jan 1.
Published in final edited form as: IEEE Secur Priv. 2011;9(5):48–55. doi: 10.1109/MSP.2011.72

Figure 1.

Figure 1

The experience-based access management (EBAM) life cycle. Access logs (ALs) are used to measure differences between existing enforced controls (EC) and the ideal model (IM) for access rights. This measurement is collected in the expected model (EM), which aids the improvement over time of enforced controls.