Tagged articles
2 articles
Page 1 of 1
IT Services Circle
IT Services Circle
Aug 5, 2022 · Information Security

Designing Permission Systems: Overview of ACL, DAC, MAC, ABAC, and RBAC Models

This article explains the fundamentals of permission system design, introducing five mainstream access control models—ACL, DAC, MAC, ABAC, and RBAC—detailing their principles, examples, advantages, drawbacks, and practical implementation considerations such as role hierarchy, constraints, and data permissions.

ABACRBACaccess control
0 likes · 15 min read
Designing Permission Systems: Overview of ACL, DAC, MAC, ABAC, and RBAC Models
Tianxing Digital Tech User Experience
Tianxing Digital Tech User Experience
Jul 5, 2019 · Product Management

How to Boost User Security Feeling in Financial Apps: Design Insights from Xiaomi Finance

This article examines how to enhance users' sense of security in financial products by analyzing Xiaomi Finance’s design details, covering first impressions, brand endorsement, privacy protection, visualizing hidden processes, and pre‑emptively communicating risks, offering practical UX strategies for building trust.

Xiaomi Financefinancial UXproduct-management
0 likes · 8 min read
How to Boost User Security Feeling in Financial Apps: Design Insights from Xiaomi Finance