Access Matrix: Implementation and Comparison
Access Matrix: Implementation and Comparison
2
ACCESS MATRIX
3
IMPLEMENTATION OF ACCESS MATRIX
There four ways listed below in which Access Matrix can be implemented
effectively.
Global Table
Access Lists for Objects
Capability Lists for Domains
Lock-Key Mechanism
4
GLOBAL TABLE
5
GLOBAL TABLE
Drawbacks
• Table size is quite large so it cannot be kept in main memory so additional I/O is
needed
• Virtual Memory techniques are used for managing this table
• Difficult to take advantage of special groupings
I.e. If at all everyone can read a particular object, this object must have a separate entry in
every domain.
6
ACCESS LISTS FOR OBJECTS
7
CAPABILITY LISTS FOR DOMAINS
8
CAPABILITY LISTS FOR DOMAINS
10
CAPABILITY LISTS FOR DOMAINS
11
LOCK-KEY MECHANISM
• Compromise between access lists and capability lists
1. Global table
• Simple, but the table can b large and often cannot take advantage of special
groupings of objects or domains
• Access lists correspond directly to the needs of users
• Determining set access rights for each domain is difficult
• Every access to the object must be checked, requiring a search of access list
in large systems with long access lists, this is time consuming
13
COMPARISON
2. Capability Lists
14
COMPARISON
3. Lock-key mechanism
• Compromise between access lists and capability lists
• Effective and flexible depending on the length of keys
• Keys passed freely from domain to domain
• Access privileges effectively revoked by changing some of the locks
associated with the objects
15
COMPARISON
17
Reference…
18
Thank u
19