O'Reilly logo

Introduction to Computer Security by Matt Bishop

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Access Control Matrix

 

GRANDPRÉ: Description cannot suit itself in words To demonstrate the life of such a battle In life so lifeless as it shows itself.

 
 --The Life of Henry the Fifth, IV, ii, 53–55.

A protection system describes the conditions under which a system is secure. In this chapter, we present a classical formulation of a protection system. The access control matrix model arose both in operating systems research and in database research; it describes allowed accesses using a matrix.

Protection State

The state of a system is the collection of the current values of all memory locations, all secondary storage, and all registers and other components of the system. The subset of this collection that deals with protection is the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required