Distributed Computer Security. 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy. Index. Security policies Access control Different types of ACM Distributed compartment - discom ACM implementations ACL vs CL RBAC Research 3D ACM ACM for grid networks.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Distributed Computer Security
8.2 Discretionary Access Control Models
- Sai Phalgun Tatavarthy
R = P ( s , o )
P – access matrix
R – set of allowable operations.( ‘r’ is a particular operation belonging to set ‘R’ ).
s – subject
o – object