Chapter 14. Access Control Mechanisms

 

CASSIO: Why, no. The day had broke Before we parted. I ha' made bold, Iago, To send in to your wife. My suit to her Is that she will to virtuous Desdemona Procure me some access.

 
 -- The Tragedy of Othello, III, i, 32–36.

Recall the access control matrix discussed in Chapter 2. As in the theoretical model, an implementation of the array and the commands to manipulate it provide a mechanism that the system can use to control access to objects. Unfortunately, there are several problems with a straightforward implementation. On a typical system, the number of subjects and objects will be sufficiently large that the matrix's size will use significant amounts of storage. Second, most entries in the matrix will ...

Get Introduction to Computer Security now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.