Building a trusted computing base
Access Control Mechanism: Access Matrix
Example from Bishop book: