School: George Washington University
Department: Computer Science and Engineering
Course: Computer Security
Professor: Mohamed refaei
Term: Fall 2016
Tags: Access, control, Computer, Security, Matrix, file, objects, subject, protection, domains, UNIX, directories, unique, identification, bits, Read, Write, execute, Lists, RBAC, Models, Cardinality, prerequisite, and roles
Name: Lecture 8 - Chapter 4: Access Control (cont’d)
Description: We continue the discussion on access control and how different users are given access to certain files, objects, etc. based on their authorized access given.