For your initial post, consider the following scenario:
You are tasked with setting up protection within a new project, and you are trying to decide on a formal security model to protect the resources (e.g., files). The two options are to implement an access matrix using the following:
Access lists that are associated with objects.
Capabilities that are associated with domains.
Compare the strengths and weaknesses of each type of implementation. Provide rationale for your statements based on your sources. Your initial post must be a minimum of 250 words.