Next:
Protection
COMP 242 Class Notes
Section 8: Protection
Protection
A Model of Access Control
Capability Lists
Access Lists
Inheritance
Negative Rights
Directories and Access Control
Aliases and Indirect Files
The Access Matrix Again
Modes
Multics Rings
PC Rings
Unix SETUID
Bell LaPadula Model
Capability-Based Systems
Physical Analogy
Access Control for Distributed Systems
Form of Access Matrix
Implementation of Access Matrix
The Confinement Problem
Cryptography
User-Authentication
Passwords
Improvements
Other Methods
Computer Authentication
About this document ...
Prasun Dewan
Wed Apr 21 11:28:53 EDT 1999