File access control relates largely to the secrecy dimension of security. What is the relationship between an access control matrix and the integrity of the objects to which access is being controlled?

What will be an ideal response?

The matrix can control mode of access (e.g., read, write, delete), of which write and delete have integrity dimensions. However, the control is very coarse: the ability to write is controlled, but what is written is not controlled.

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a powerful, interactive data-mining feature that enables you to summarize and analyze data, especially helpful when working with large datasets

Fill in the blank(s) with correct word

Computer Science & Information Technology

To allow file access in a program, you must use __________ in the header file.

a. #include file b. #include fileaccess c. #include fstream d. #include cfile

Computer Science & Information Technology