Skip to search formSkip to main contentSkip to account menu

Access Control Matrix

Known as: Access matrix, Access matrix model, The Access Matrix 
In computer science, an Access Control Matrix or Access Matrix is an abstract, formal security model of protection state in computer systems, that… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
DDoS Attack is launched by attackers by exploiting all the vulnerabilities in the present system design. The sole dependence of… 
2012
2012
Role Mining Problem (RMP) is an important issue in RBAC design and development. Genetic algorithm (GA) can be an effective method… 
2010
2010
  • 2010
  • Corpus ID: 1492763
26 ABSTRACT The increase in Internet-based transactions and communications offers new opportunities for hackers to disrupt… 
2005
2005
A leftist grammar is a rewrite system in which the only kind of production rules allowed are “create left-context” via a −→ ba… 
2003
2003
We consider the use of a hierarchically layered architecture for object-oriented systems and we look at the specification of… 
1999
1999
This paper presents an authorization scheme for large-scale networks that involves programming models and tools represented by… 
Review
1997
Review
1997
We present an overview of the Saga Security System. An agent in the Saga Security System is called a Saga Agent. The… 
1994
1994
V/e describe a system called Miro for specifying and checking security constraints. Our sys- tem is general because it is not… 
1994
1994
Given the present trends regarding distributed computer systems, the standard model of security used on most distributed systems… 
1992
1992
  • H. BiW. Giloi
  • 1992
  • Corpus ID: 45065104
Many elementary numerical algorithms involve not only vector operations but also matrix operations. Today's vector processors…