This is a potential security issue, you are being redirected to https://csrc.nist.gov
An access control approach in which access is mediated based on attributes associated with subjects (requesters) and the objects to be accessed. Each object and subject has a set of associated attributes, such as location, time of creation, access rights, etc. Access to an object is authorized or denied depending upon whether the required (e.g., policy-defined) correlation can be made between the attributes of that object and of the requesting subject.
NIST SP 800-95 under Attribute Based Access Control Common Criteria for Information Technology Security Evaluation (CC) Version 2.3, Part 2: Security Functional Components FDP_ACF.1
Access control based on attributes associated with and about subjects, objects, targets, initiators, resources, or the environment. An access control rule set defines the combination of attributes under which an access may take place. See also identity, credential, and access management (ICAM).
an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together. The policies can use any type of attributes (user attributes, resource attributes, environment attribute etc.
NIST SP 800-192 under ABAC