Next:
Protection
COMP 242 Class Notes
Section 8: Protection
Protection
A Model of Access Control
Capability Lists
Access Lists
Inheritance
Negative Rights
Directories and Access Control
Aliases and Indirect Files
The Access Matrix Again
Modes
Multics Rings
Unix
Bell LaPadula Model
Capability-Based Systems
Physical Analogy
The Confinement Problem
Cryptography
User-Authentication
Passwords
Improvements
Other Methods
Computer Authentication
About this document ...
Prasun Dewan
Mon Nov 4 12:08:34 EST 1996