Access Control matrix vs Capability table

An access control matrix is a list of objects along with the permissions granted for each object. You can think of an access control matrix as a group of ACLs. Each ACL represents a single object and lists all the permissions for that object. A capability table is a...

Protection domain vs protection rings

A protection domain consists of the execution and memory space assigned to each process The use of protection rings is a scheme that supports multiple protection domains. Source: https://en.wikipedia.org/wiki/Protection_ring

Biba model in simple terms

The Biba model, another MAC-based model, enforces integrity (unlike the Bell-LaPadula model, which enforces confidentiality). Biba includes two rules that are reversed from the Bell-LaPadula model: Simple Integrity Axiom—no read down :  Subjects granted...

Bell-LaPadula model in simple terms

David Elliott Bell and Leonard J. LaPadula designed the Bell-LaPadula model with a primary goal of ensuring confidentiality. It enforces security through two primary rules, commonly called no read up and no write down. Each of these rules compares the subject’s...