Skip to search formSkip to main contentSkip to account menu

Access Control Matrix

Known as: Access matrix, Access matrix model, The Access Matrix 
In computer science, an Access Control Matrix or Access Matrix is an abstract, formal security model of protection state in computer systems, that… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
DDoS Attack is launched by attackers by exploiting all the vulnerabilities in the present system design. The sole dependence of… 
2012
2012
Role Mining Problem (RMP) is an important issue in RBAC design and development. Genetic algorithm (GA) can be an effective method… 
2011
2011
  • S. Vimercati
  • 2011
  • Corpus ID: 21808782
2005
2005
A leftist grammar is a rewrite system in which the only kind of production rules allowed are “create left-context” via a −→ ba… 
2003
2003
We consider the use of a hierarchically layered architecture for object-oriented systems and we look at the specification of… 
1999
1999
This paper presents an authorization scheme for large-scale networks that involves programming models and tools represented by… 
Review
1997
Review
1997
We present an overview of the Saga Security System. An agent in the Saga Security System is called a Saga Agent. The… 
1995
1995
In this paper, we discuss access control for objects distributed over heterogeneous network management systems. In particular, we… 
1994
1994
Given the present trends regarding distributed computer systems, the standard model of security used on most distributed systems… 
1992
1992
  • H. BiW. Giloi
  • 1992
  • Corpus ID: 45065104
Many elementary numerical algorithms involve not only vector operations but also matrix operations. Today's vector processors…