Programming to realize access control matrix,
1) build a two-dimensional table: behavior process, as a file, process of intersection for access to the file;
2) commission access request, (process name P, file F, access A), according to the process name, name of the file to check the two-dimensional table intersection corresponding permissions R
3) to compare A and R are consistent, if is consistent, it returns YES, otherwise, return the No