Page 35 - Cyber Warnings
P. 35







Lock, stock and two smoking access controls


By Milica D. Djekic


The point of this article would not be to deal with some London’s gangs, but rather to present
what the access control is and why it matters. We already know that the one who controls the
access – controls the entire asset. Right here, we would deal with so fascinating, but still so
simple topic such as Lampson’s matrix and also try to provide a better insight how the systems
being based on that matrix function in a physical way. So, get prepared – this would be a good
drive through the world of lock, stock and two smoking – let’s say – access controls.

The access control got crucially significant to protecting your resources from the unwanted
approaching on. Many today’s solutions would rely on the well-known Lampson’s matrix system,
while some novel designs would deal with the fingerprinting technology. Such a technology got
so convenient to highly
sophisticated systems and it’s
something that we would usually
meet in the science-fiction movies,
follow ups and shows. The Figure
on our right would illustrate some of
those highly sophisticated
technologies – probably finding its
role with some well-simulated and
graphically designed video game or
film. The secret with this sort of
technology is that you would take
someone’s fingerprint’s pattern and
use it every single time – you intend
to access that asset. Only if your
fingerprint trace and such a sample
match relying on pattern recognition technology – you would get the access on.

Right here, we would suggest that the standard access control systems would deal with the
Lampson’s matrix. The matrix is something similar to a table where every row and column got
their meaning. In a Lampson’s matrix, the rows got called the subjects, while the columns got
called the objects. The subjects can perform an operation over the objects which are defined in
a table or – more precisely – the matrix. The Table 1 illustrates how this works in a practice.

As it’s demonstrated through the Figure 1 – the users 1 and 2 are the subjects which can
perform the operations read and write over the objects being recognized as files 1, 2, 3 or 4.



35 Cyber Warnings E-Magazine October 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   30   31   32   33   34   35   36   37   38   39   40