{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

CS283 - Lecture 4 - Part 2 - AccessControlLists

CS283 - Lecture 4 - Part 2 - AccessControlLists - Lecture 4...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Lecture 4 – Part 2 - Access Control Lists GWU CS 172/283 Autumn 2009 Sources: Memon’s notes, Brooklyn Poly Bishop’s Text, Chapter 15 Bishop’s slides, Chapter 15 Text by Pfleeger and Pfleeger, Chapter 4
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Access Control Mechanisms Access Control Matrix Access Control List Capability based access control L k d K b d t l Lock and Key based access control. Rings-based access control GWU CS 172/283 - Autumn 2009 Holmblad - Lecture 04 – Part 2- Rev 20090929 2
Background image of page 2