Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,750,469 papers from all fields of science
Search
Sign In
Create Free Account
Access Control Matrix
Known as:
Access matrix
, Access matrix model
, The Access Matrix
In computer science, an Access Control Matrix or Access Matrix is an abstract, formal security model of protection state in computer systems, that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Access control
Access control list
Bell–LaPadula model
Capability-based security
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
DDoS Attack detection and Prevention in Private Cloud Environment
S. Begum
2016
Corpus ID: 20354529
DDoS Attack is launched by attackers by exploiting all the vulnerabilities in the present system design. The sole dependence of…
Expand
2012
2012
Design and Performance Evaluation of Improved Genetic Algorithm for Role Mining Problem
I. Saenko
,
Igor Kotenko
20th Euromicro International Conference on…
2012
Corpus ID: 16751546
Role Mining Problem (RMP) is an important issue in RBAC design and development. Genetic algorithm (GA) can be an effective method…
Expand
2010
2010
Mitigation of Application Traffic DDoS Attacks with Trust and AM Based HMM Models
2010
Corpus ID: 1492763
26 ABSTRACT The increase in Internet-based transactions and communications offers new opportunities for hackers to disrupt…
Expand
2005
2005
A non-regular leftist language
Sumana Bandyopadhyay
,
M. Mahajan
,
K. Kumar
2005
Corpus ID: 678313
A leftist grammar is a rewrite system in which the only kind of production rules allowed are “create left-context” via a −→ ba…
Expand
2003
2003
Layers and non-functional patterns
E. Fernández
2003
Corpus ID: 9400860
We consider the use of a hierarchically layered architecture for object-oriented systems and we look at the specification of…
Expand
1999
1999
Authorization schemes for large-scale systems based on Java, CORBA and Web security models
C. Westphall
,
J. Fraga
IEEE International Conference on Networks. ICON…
1999
Corpus ID: 25155712
This paper presents an authorization scheme for large-scale networks that involves programming models and tools represented by…
Expand
Review
1997
Review
1997
The Saga Security System: a security architecture for open distributed systems
Masakazu Soshi
,
M. Maekawa
Proceedings of the Sixth IEEE Computer Society…
1997
Corpus ID: 15205435
We present an overview of the Saga Security System. An agent in the Saga Security System is called a Saga Agent. The…
Expand
1994
1994
Specifying and Checking UNIX Security Constraints
Allan Heydon
,
J. D. Tygar
Computing Systems
1994
Corpus ID: 2667831
V/e describe a system called Miro for specifying and checking security constraints. Our sys- tem is general because it is not…
Expand
1994
1994
The distributed compartment model for resource management and access control
ControlSteven J. Greenwald
,
andRichard E. Newman-Wolfe
1994
Corpus ID: 108801691
Given the present trends regarding distributed computer systems, the standard model of security used on most distributed systems…
Expand
1992
1992
Supporting matrix operations in vector architectures
H. Bi
,
W. Giloi
Proceedings Sixth International Parallel…
1992
Corpus ID: 45065104
Many elementary numerical algorithms involve not only vector operations but also matrix operations. Today's vector processors…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE