With over 300 new entries, appearing in an A-Z format, this encyclopedia provides easy, intuitive access to information on all aspects of cryptography and security.The scheme relies heavily on the notion of owners, and is based on the access matrix model, which is commonly attributed to Lampson [ ]. ... a computing device , and the commands in the HRU model are the computing instructions; hence the HRU model gives a general-purpose computing mechanism. ... A user can be a member of several groups; and each group contains a set of users as its members.
|Title||:||Encyclopedia of Cryptography and Security|
|Author||:||Henk C.A. van Tilborg, Sushil Jajodia|
|Publisher||:||Springer Science & Business Media - 2011-09-06|