File access control relates largely to the secrecy dimension of security. What is the relationship between an access control matrix and the integrity of the objects to which access is being controlled?
What will be an ideal response?
The matrix can control mode of access (e.g., read, write, delete), of which write and delete have integrity dimensions. However, the control is very coarse: the ability to write is controlled, but what is written is not controlled.
Computer Science & Information Technology
You might also like to view...
A(n) ________ is a powerful, interactive data-mining feature that enables you to summarize and analyze data, especially helpful when working with large datasets
Fill in the blank(s) with correct word
Computer Science & Information Technology
To allow file access in a program, you must use __________ in the header file.
a. #include file b. #include fileaccess c. #include fstream d. #include cfile
Computer Science & Information Technology