Access Matrix Report[1]
Access Matrix Report[1]
SUBMITTED BY:
Section: B
This model helps prevent unauthorized operations by clearly specifying who can read, write, or
own resources. It also supports delegation, where users with certain rights can share them with
others securely.
2. Purpose
The purpose of the Access Matrix model is to provide a systematic way to define and enforce
access control in operating systems. It specifies what operations users (or domains) can perform
on system resources, such as files, devices, or data. This ensures security by preventing
unauthorized access or modifications, maintaining data integrity and confidentiality.
3. Background
In computer security, managing who can access what resource is crucial. The Access Matrix was
introduced as a flexible and intuitive model to represent the permissions of multiple users across
various resources in a matrix format. Each row corresponds to a user or domain, and each column
corresponds to a resource. The intersection cells specify the rights (like read, write, execute) that
the user holds on that resource.
This model forms the foundation for many practical access control systems, such as Access Control
Lists (ACLs) and Capability Lists. It also supports advanced features like delegation of rights,
which allows users with sufficient privileges to share their access rights with others.
➢ Libraries:
No external libraries are used; all code is written in plain JavaScript for better control and learning.
Scenario 1:
Scenario 2:
ii. Access Metrix with Owner Rights
Scenario 1:
Scenario 2:
Scenario 3:
Conclusion:
This project successfully simulates the Access Matrix model used in operating systems for
managing permissions. It was developed using HTML, CSS, and JavaScript with two main parts:
Users can dynamically add domains, resources, assign permissions, and delegate rights. The
simulator allows testing different scenarios, helping visualize how access control and permission
propagation work. Overall, the project made it easier to understand core OS concepts like security,
access rights, and user-resource interaction in a hands-on and interactive way.