Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,084,867 papers from all fields of science
Search
Sign In
Create Free Account
Access Control Matrix
Known as:
Access matrix
, Access matrix model
, The Access Matrix
In computer science, an Access Control Matrix or Access Matrix is an abstract, formal security model of protection state in computer systems, that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Access control
Access control list
Bell–LaPadula model
Capability-based security
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Data federation strategies for ATLAS using XRootD
R. Gardner
,
S. Campana
,
+7 authors
W. Yang
2014
Corpus ID: 53518661
In the past year the ATLAS Collaboration accelerated its program to federate data storage resources using an architecture based…
Expand
2011
2011
Access Control Matrix
A. Estes
Encyclopedia of Cryptography and Security
2011
Corpus ID: 21994318
Def: The state of a system is the collection of the current values of all memory locations, all secondary storage, all registers…
Expand
2011
2011
An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC)
Marko Komlenovic
,
Mahesh V. Tripunitara
,
T. Zitouni
Conference on Data and Application Security and…
2011
Corpus ID: 2514884
We consider the distributed access enforcement problem for Role-Based Access Control (RBAC) systems. Such enforcement has become…
Expand
2009
2009
A Method for Privacy Protection in Location Based Services
Fei Xu
,
Jingsha He
,
Xu Wu
,
Jing Xu
Ninth IEEE International Conference on Computer…
2009
Corpus ID: 16390336
Privacy protection is a very important issue and solutions must be developed for wide acceptance of location based services (LBSs…
Expand
1998
1998
Specifying application-level security in workflow systems
M. Olivier
,
R. V. D. Riet
,
E. Gudes
Proceedings Ninth International Workshop on…
1998
Corpus ID: 15970676
A workflow process involves the execution of a set of related activities over time to perform a specific task. Security requires…
Expand
Review
1997
Review
1997
The Saga Security System: a security architecture for open distributed systems
Masakazu Soshi
,
M. Maekawa
Proceedings of the Sixth IEEE Computer Society…
1997
Corpus ID: 15205435
We present an overview of the Saga Security System. An agent in the Saga Security System is called a Saga Agent. The…
Expand
1994
1994
Specifying and Checking UNIX Security Constraints
Allan Heydon
,
J. D. Tygar
Computing Systems
1994
Corpus ID: 2667831
V/e describe a system called Miro for specifying and checking security constraints. Our sys- tem is general because it is not…
Expand
1991
1991
A dynamic key-lock-pair access control scheme
J. Jan
,
Chinchen Chang
,
S. J. Wang
Computers & security
1991
Corpus ID: 8495452
1989
1989
On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial
C. Laih
,
L. Harn
,
Jau-Yien Lee
IEEE Trans. Software Eng.
1989
Corpus ID: 46069893
A single-key-lock (SKL) mechanism used for implementing the access matrix of a computer protection system is proposed. The key…
Expand
1988
1988
Minix security policy model
J. E. Roskos
[Proceedings ] Fourth Aerospace Computer Security…
1988
Corpus ID: 56836045
The author describes how the Bell-La Padula model might be applied to the current, unrated Minix operating system. Also discussed…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE