subject

Consider a computer system with three users: alice, bob, and cathy. alice owns the file file, and bob and cathy can read it. cathy can read and write bob's file bfile, but alice can only read it. only cathy can read and write her file cfile. assume that the owner of each of these files can execute his/her file. 1.a.) list acl of objects. 1.b.) list capabilities of subjects. 1.c.) create the corresponding access control matrix for this scenario. 1.d.) by using the appropriate primitive commands in section 2.3 of the textbook, write the primitive commands for the following access right changes: - cathy gives alice permission to read cfile. - alice removes the right for bob to read the file. 1.e.) show the new access control matrix after 1d is executed.

ansver
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 11:40, silviamgarcia
Pthreads programming: create and terminate a thread write a c++ program that creates a thread. the main will display a message “hello world from the main”. the main will create a thread that will display a message “hello world from the thread” and then terminates with a call to pthread_exit()
Answers: 3
image
Computers and Technology, 23.06.2019 20:00, emmaraeschool
Me ajude por favor , coloquei uma senha e não consigo tira-la no chorme
Answers: 2
image
Computers and Technology, 24.06.2019 16:30, magalya01
Which program can damage your computer?
Answers: 1
image
Computers and Technology, 25.06.2019 01:30, christyr2002
Once a vulnerability has been identified by nessus, where would you check for more information regarding the identified vulnerability, exploits, and any risk mitigation solution?
Answers: 1
You know the right answer?
Consider a computer system with three users: alice, bob, and cathy. alice owns the file file, and b...

Questions in other subjects:

Konu
Mathematics, 25.09.2019 10:50