Skip to search formSkip to main contentSkip to account menu

Access Control Matrix

Known as: Access matrix, Access matrix model, The Access Matrix 
In computer science, an Access Control Matrix or Access Matrix is an abstract, formal security model of protection state in computer systems, that… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
—One of the major threats for the Internet's reliability and stability is Distributed Denial-of-Service (DDoS) attack. The… 
Highly Cited
2009
Highly Cited
2009
Distributed denial of service (DDoS) attack is a continuous critical threat to the Internet. Derived from the low layers, new… 
Highly Cited
2005
Highly Cited
2005
In traditional access control models like MAC, DAC, and RBAC, authorization decisions are determined according to identities of… 
Highly Cited
2003
Highly Cited
2003
Abstract: Extractive activities targeting a wide range of nontimber forest products ( NTFPs ) are ubiquitous in tropical forests… 
Highly Cited
2001
Highly Cited
2001
Assurance that an access control configuration will not result in the leakage of a right to an unauthorized principal, called… 
1998
1998
A workflow process involves the execution of a set of related activities over time to perform a specific task. Security requires… 
Review
1997
Review
1997
We present an overview of the Saga Security System. An agent in the Saga Security System is called a Saga Agent. The… 
1992
1992
  • R. Sandhu
  • 1992
  • Corpus ID: 349215
1989
1989
A single-key-lock (SKL) mechanism used for implementing the access matrix of a computer protection system is proposed. The key…