Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,110,489 papers from all fields of science
Search
Sign In
Create Free Account
Access Control Matrix
Known as:
Access matrix
, Access matrix model
, The Access Matrix
In computer science, an Access Control Matrix or Access Matrix is an abstract, formal security model of protection state in computer systems, that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Access control
Access control list
Bell–LaPadula model
Capability-based security
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
DDoS Attack detection and Prevention in Private Cloud Environment
S. Begum
2016
Corpus ID: 20354529
DDoS Attack is launched by attackers by exploiting all the vulnerabilities in the present system design. The sole dependence of…
Expand
2011
2011
Access Control Matrix
A. Estes
Encyclopedia of Cryptography and Security
2011
Corpus ID: 21994318
Def: The state of a system is the collection of the current values of all memory locations, all secondary storage, all registers…
Expand
2009
2009
A Method for Privacy Protection in Location Based Services
Fei Xu
,
Jingsha He
,
Xu Wu
,
Jing Xu
Ninth IEEE International Conference on Computer…
2009
Corpus ID: 16390336
Privacy protection is a very important issue and solutions must be developed for wide acceptance of location based services (LBSs…
Expand
Review
2005
Review
2005
Progress of restricted access matrix solid phase extraction
Yq Cai
,
S. Mou
2005
Corpus ID: 99111401
The theory, characteristic, current status and progress trend of restricted access matrix solid phase extraction are introduced…
Expand
2004
2004
Zero-padded OFDM with improved performance over multipath channels
P. Papadimitriou
,
C. Georghiades
First IEEE Consumer Communications and Networking…
2004
Corpus ID: 18826396
It has been proposed recently to replace the cyclic prefix (CP) in OFDM transmission by zero-padding (ZP); this guarantees symbol…
Expand
1999
1999
Authorization schemes for large-scale systems based on Java, CORBA and Web security models
C. Westphall
,
J. Fraga
IEEE International Conference on Networks. ICON…
1999
Corpus ID: 25155712
This paper presents an authorization scheme for large-scale networks that involves programming models and tools represented by…
Expand
Review
1997
Review
1997
The Saga Security System: a security architecture for open distributed systems
Masakazu Soshi
,
M. Maekawa
Proceedings of the Sixth IEEE Computer Society…
1997
Corpus ID: 15205435
We present an overview of the Saga Security System. An agent in the Saga Security System is called a Saga Agent. The…
Expand
1995
1995
Integrated Access Control Management
G. Karjoth
Intelligence and Services in Networks
1995
Corpus ID: 45941902
In this paper, we discuss access control for objects distributed over heterogeneous network management systems. In particular, we…
Expand
1988
1988
Minix security policy model
J. E. Roskos
[Proceedings ] Fourth Aerospace Computer Security…
1988
Corpus ID: 56836045
The author describes how the Bell-La Padula model might be applied to the current, unrated Minix operating system. Also discussed…
Expand
1965
1965
Utilization of the t* Partial Switching Properties of Ferroelectrics in Memory Devices
G. Taylor
IEEE Transactions on Electronic Computers
1965
Corpus ID: 28690538
Some ferroelectric materials exhibit a transition from stable to unstable partial switching at a critical pulsewidth t*. Schemes…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE