Explain how access control lists might be implemented.

What will be an ideal response?

A capability table specifies the subjects and objects that users or groups can access; in some systems, capability tables are called user profiles or user policies. These specifications frequently take the form of complex matrices, rather than simple lists or tables. The access control matrix combines capability tables and ACLs, so that organizational assets are listed along the vertical axis while users are listed along the horizontal axis. The resulting matrix contains ACLs in columns for a particular device or asset, while a row contains the capability table for a particular user.

Computer Science & Information Technology

You might also like to view...

Facebook and LinkedIn are examples of:

a.forums b.MMORPGs c.social networks d.wikis

Computer Science & Information Technology

Which Validation Rule specifies that the number that is entered is greater than zero?

A) >>0 B) #>0 C) >#0 D) >0

Computer Science & Information Technology