This document discusses access control and protection states. It provides an overview of access control matrices, which represent protection states by defining the access rights of subjects over objects. Protection state transitions occur through commands that modify the access control matrix using primitive operations like creating/destroying subjects/objects and adding/deleting rights. Conditional commands and special rights like ownership are also covered. The principle of attenuation of privilege restricts giving rights that a subject does not possess.