Chapter 11: Protection

                                                                                                                                                                         Home

                              

                                       11.1   Goals of Protection

 

                                       11.2   Access Matrix

 

                                       11.3   Implementation of Access Matrix

   

                                       11.4   Revocation of Access Rights

 

                                       11.5   Language-Based Protection