identity-based security policy
policy based security management
Policy-based security management
Rule-based Security Policy
GPO Group policy object
Group policy management
group-based access control
Group-based Acknowledgement model
group-based candidate selection rule
Identity-based Group Signature