Explore chapters and articles related to this topic
Role and Development of Security Architecture and Models in Software Systems
Published in Uzzal Sharma, Parmanand Astya, Anupam Baliyan, Salah-ddine Krit, Vishal Jain, Mohammad Zubair Khan, Advancing Computational Intelligence Techniques for Security Systems Design, 2023
The model defines what a subject can execute on an object. The model is based on concepts of subject, object, rights, and an access control matrix. The matrix has one row for a subject and one column for a subject and an object. The element of the matrix denotes the rights of a subject on another subject or object. There are eight primitive protection rights that can be issued by subjects on other subjects or objects.
A
Published in Phillip A. Laplante, Dictionary of Computer Science, Engineering, and Technology, 2017
access control matrix a tabular representation of the modes of access permitted from active entities (programs or processes) to passive entities (objects, files, or devices). A typical format associates a row with an active entity or subject and a column with an object; the modes of access permitted from that active entity to the associated passive entity are listed in the table entry.
A
Published in Philip A. Laplante, Comprehensive Dictionary of Electrical Engineering, 2018
ACI access control a means of allowing access to an object based on the type of access sought, the accessor's privileges, and the owner's policy. access control list a list of items associated with a file or other object; the list contains the identities of users that are permitted access to the associated file. There is information (usually in the form of a set of bits) about the types of access (such as read, write, or delete) permitted to the user. access control matrix a tabular representation of the modes of access permitted from active entities (programs or processes) to passive entities (objects, files, or devices). A typical format associates a row with an active entity or subject and a column with an object; the modes of access permitted from that active entity to the associated passive entity are listed in the table entry. access line a communication line that connects a user's terminal equipment to a switching node. access mechanism a circuit board or an integrated chip that allows a given part of a computer system to access another part. This is typically performed by using a specific access protocol. access protocol a set of rules that establishes communication among different parts. These can involve both hardware and software specifications. access right permission to perform an operation on an object, usually specified as the type of operation that is permitted, such as read, write, or delete. Access rights can be included in access control lists, capability lists, or in an overall access control matrix. access time the total time needed to retrieve data from memory. For a disk drive, this is the sum of the time to position the read/write head over the desired track and the time until the desired data rotates under the head. (LW) accidental rate the rate of false coincidences in the electronic counter experiment produced by products of the reactions of more than one beam particle within the time resolution of the apparatus. accumulation an increase in the majority carrier concentration of a region of semiconductor due to an externally applied electric field. accumulator (1) a register in the CPU (processor) that stores one of the operands prior to the execution of an operation, and into which the result of the operation is stored. An accumulator serves as an implicit source and destination of many of the processor instructions. For example, register A of the Intel 8085 is an accumulator. See also CPU and processor. (2) the storage ring in which successive pulses of particles are collected in order to create a particle beam of reasonable intensity for colliding beams. achievable rate region for a multiple terminal communications system, a set of rate-vectors for which there exist codes such that the probability of making a decoding error can be made arbitrarily small. See also capacity region, multiple access channel. achromatic the quality of a transport line or optical system where particle momentum has no effect on its trajectory through the system. In an achromatic device or system, the output beam displacement or divergence (or both) is independent of the input beam's momentum. If a system of lenses is achromatic, all particles of the same momentum will have equal path lengths through the system. achromatic color hue. ACI perceived color devoid of
Supporting users in data disclosure scenarios in agriculture through transparency
Published in Behaviour & Information Technology, 2022
Sebastian Linsner, Enno Steinbrink, Franz Kuntke, Jonas Franken, Christian Reuter
First, the access control matrix represents one of the initial forms of access rights management (Lampson 1974; Kizza 2015; Paci, Squicciarini, and Zannone 2018). It provides potential users with access rights by assigning the access to certain sensitive objects (y-axis) to specific actors/users (x-axis) in the form of a simple table (see Figure 1(a)). From this starting point, the concept of the access control matrix has been further developed by different approaches. Using shared data in social networks as an example, (Hu, Ahn, and Jorgensen 2011) developed a color-coded representation of conflicting privacy settings between linked users. This proposal was complemented by two pressure indicators as metaphors in the tools' interface, which allows users to weigh the privacy risks against the loss of audience reach. Through the application ‘Expandable Grid’, Reeder et al. (2008) also propose a modified access control matrix in which colors stand for different, potentially overlapping sets of data access rules. Conversely, the proposal by Kolomeets et al. (2019), which was developed for hierarchical contexts within a company, resorts to triangular matrices. Here, different colors were assigned to different categories of access rights, adding the distinction between reading and writing rights to the binary concept of access versus denial (Kolomeets et al. 2019).
Least Privilege across People, Process, and Technology: Endpoint Security Framework
Published in Journal of Computer Information Systems, 2022
Miloslava Plachkinova, Kenneth Knapp
Controlling a business process can be accomplished by the creation of an access control matrix (ACM) or access control list. A comprehensive ACM can trace each subject’s (person’s) access to objects. Objects can include accounts, information, and applications that pertain to critical processes. Thus, an ACM can effectively limit a person’s access rights to objects. An example policy to help mandate the use of an ACM can be: The HR and IT organizations shall together ensure the development and maintenance of an access control matrix that specifies employee access rights to company data and business processes.