This approached evaluates rules against the attributes of entities, operations, and the environment which is relevant to a request. These attributes must be evaluated and compared against access control rules defining subject / object attribute combinations in a given envrionment.