Page 36 - Cyber Warnings
P. 36













Table 1. The Lampson’s matrix
illustration















The Lampson’s File 1 File 2 File 3 File 4

User 1 - read read, write -


User 2 read - write read, write


The experience would suggest that this could get created not only mathematically, but rather
physically using the wires and buttons. Such a Figure has been given on our left and it
demonstrates how pressing the button with your bank’s card machine – you can get an access
to your funds. In such an example, it’s getting clear that entering the PIN code 3761 and
pressing Enter – you can pass through that control’s check. Simply, once you press the button –
you will make a contact between two wires representing the rows and columns of the
Lampson’s matrix. It’s all about the fields representing something and being used to offer an
access. Finally, we would conclude this effort indicating that the access control found many
practical applications and it’s not used to secure your funds only – but rather your objects,
assets and properties. Hope this brief insight gave a good overview on how everything function
in a reality and what could be the advantages of this simple and still inexpensive technology.

About The Author


Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher
from Subotica, Serbia. She also serves as a Reviewer at the Journal of
Computer Sciences and Applications and. She writes for American and Asia-
Pacific security magazines. She is a volunteer with the American corner of
Subotica as well as a lecturer with the local engineering society.

36 Cyber Warnings E-Magazine October 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   31   32   33   34   35   36   37   38   39   40   41