Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,217,483 papers from all fields of science
Search
Sign In
Create Free Account
Access Control Matrix
Known as:
Access matrix
, Access matrix model
, The Access Matrix
In computer science, an Access Control Matrix or Access Matrix is an abstract, formal security model of protection state in computer systems, that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Access control
Access control list
Bell–LaPadula model
Capability-based security
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Protection from Application Layer DDoS Attacks for Popular Websites
S. Rajesh
2013
Corpus ID: 18647246
—One of the major threats for the Internet's reliability and stability is Distributed Denial-of-Service (DDoS) attack. The…
Expand
Highly Cited
2009
Highly Cited
2009
Monitoring the Application-Layer DDoS Attacks for Popular Websites
Yi Xie
,
Shunzheng Yu
IEEE/ACM Transactions on Networking
2009
Corpus ID: 633503
Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from the low layers, new…
Expand
Highly Cited
2005
Highly Cited
2005
An attribute-based access matrix model
Xinwen Zhang
,
Yingjiu Li
,
Divya Nalla
ACM Symposium on Applied Computing
2005
Corpus ID: 6573802
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of…
Expand
Highly Cited
2003
Highly Cited
2003
Extent of Nontimber Resource Extraction in Tropical Forests: Accessibility to Game Vertebrates by Hunters in the Amazon Basin
C. Peres
,
I. Lake
2003
Corpus ID: 55507873
Abstract: Extractive activities targeting a wide range of nontimber forest products ( NTFPs ) are ubiquitous in tropical forests…
Expand
Highly Cited
2001
Highly Cited
2001
Practical safety in flexible access control models
T. Jaeger
,
Jonathon Tidswell
ACM Transactions on Privacy and Security
2001
Corpus ID: 12062950
Assurance that an access control configuration will not result in the leakage of a right to an unauthorized principal, called…
Expand
1998
1998
Specifying application-level security in workflow systems
M. Olivier
,
R. V. D. Riet
,
E. Gudes
Proceedings Ninth International Workshop on…
1998
Corpus ID: 15970676
A workflow process involves the execution of a set of related activities over time to perform a specific task. Security requires…
Expand
Review
1997
Review
1997
The Saga Security System: a security architecture for open distributed systems
Masakazu Soshi
,
M. Maekawa
Proceedings of the Sixth IEEE Computer Society…
1997
Corpus ID: 15205435
We present an overview of the Saga Security System. An agent in the Saga Security System is called a Saga Agent. The…
Expand
1994
1994
Access control with binary keys
Chinchen Chang
,
Jao-Ji Shen
,
Tzong-Chen Wu
Computers & security
1994
Corpus ID: 34882280
1992
1992
Undecidability of Safety for the Schematic Protection Model with Cyclic Creates
R. Sandhu
Journal of computer and system sciences (Print)
1992
Corpus ID: 349215
1989
1989
On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial
C. Laih
,
L. Harn
,
Jau-Yien Lee
IEEE Trans. Software Eng.
1989
Corpus ID: 46069893
A single-key-lock (SKL) mechanism used for implementing the access matrix of a computer protection system is proposed. The key…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE