Skip to main content

Related Concepts

Access Control Matrix; Access Control Policies, Models, Mechanisms; Discretionary Access Control Policies (DAC)

Definition

An access matrix represents the set of authorizations defined at a given time in the system.

Background

The access matrix model provides a framework for describing discretionary access control policies. First proposed by Lampson [3] for the protection of resources within the context of operating systems, and later refined by Graham and Denning [1], the model was subsequently formalized by Harrison, Ruzzo, and Ullmann (HRU model) [2], who developed the access control model proposed by Lampson to the goal of analyzing the complexity of determining an access control policy. The original model is called access matrix since the authorization state, meaning the authorizations holding at a given time in the system, is represented as a matrix. The matrix therefore gives an abstract representation of protection systems.

Theory and Application

In the access...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Graham GS, Denning PJ (1972) Protection – principles and practice. In: AFIPS spring joint computer conference, Atlantic City, vol 40, pp 417–429

    Google Scholar 

  2. Harrison MH, Ruzzo WL, Ullman JD (1976) Protection in operating systems. Commun ACM 19(8):461–471

    Article  MATH  MathSciNet  Google Scholar 

  3. Lampson BW (1971) Protection. In: Proceedings of the 5th Princeton Symposium on Information Science and Systems, Princeton university, p 437

    Google Scholar 

  4. Samarati P, De Capitani di Vimercati S (2001) Access control: policies, models, and mechanisms. In: Focardi R, Gorrieri R (eds) Foundations of Security Analysis and Design. Lecture notes in computer science, vol 2171. Springer, Berlin

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

De Capitani di Vimercati, S. (2011). Access Matrix. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_807

Download citation

Publish with us

Policies and ethics