VqI14dIZgOPEqICDVdzsdHohm6R1qA6BYQ86dmeQ

Search This Blog

Report Abuse

About Me

Anne Rutherford
Visit profile

Access Control Matrix In Information Security

View 15 Access Control Matrix In Information Security - An Access Control Matrix, also known as an Access Matrix in computer science, is an abstract, formal security model of protection state in computer systems that describes the rights of each subject with regard to every object in the system. There are also several choices available, such as a local server from within the institution. What exactly is an access control matrix? It's a matrix A in which Ai,j represents the permissions that subject I has to access resource j. The permissions might be "read," "read,write," or "read,execute." The access control matrix is an abstraction that encapsulates the policy that an access control mechanism enforces.

In its most basic form, access control in information security is concerned with establishing who has access to what information (files, directories, applications, etc.). For example, if I visit our company's file server, I may see marketing-related papers. Someone in our Finance department, on the other hand, may evaluate financial papers. Resources, since they are files, can be read, written, or executed. Each row in the access control matrix corresponds to a different entity in the system: each UID, each GID, and the special world group. Each column represents a file in the system. Each item will consist of a subset of read/write/execute commands.

PROCEDURE FOR ACCESS CONTROL IN INFORMATION SECURITY 1. PURPOSE: To implement the security control requirements for the Access Control (AC) family as outlined in the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53, Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations. 2. The Access Control Matrix Operations System may go from one ACM state to another. Primitive operations include: creating a subject, creating an object, destroying a subject, destroying an object, adding an access right, and deleting an access right. Of course, transitions are conditional. Steven M. Bellovin's 12th of September, 2005 3


TAG : Access Control Matrix In Information Security Ppt,What Is The Use Of Access Control Matrix In Information Security
Related Posts

Related Posts

Post a Comment