*If you can not answer it!!! please don\'t waste your time to post the solution.
ID: 3645469 • Letter: #
Question
*If you can not answer it!!! please don't waste your time to post the solution.
The model of protection in a computer system can be viewed as an access control matrix, with rows
representing objects (for example ?les), and columns representing domains (for example users). Each
entry in the matrix represents the access rights of the domain to the object. Consider the access control
matrix below:
http://imageshack.us/photo/my-images/641/matrixy.png/
Assume that each user (domain) is the owner of the ?le (object) with the name starting with their (8)
initial, i.e. Anna owns A?le, Bill owns B?le etc. Represent the access control matrix in the table
above using protection scheme available in UNIX. You will need to de?ne groups of users.
Explanation / Answer
Considering the above access control matrix, the UNIX protection scheme can be implemented to each user by following list of commands on UNIX cmd prompt: chmod Anna=r Afile Bfile chmod Anna=x Afile Cfile chmod Anna=w Afile chmod Bill=r Afile Bfile chmod Bill=x Bfile Cfile chmod Charles=r Afile Bfile Cfile Dfile chmod Charles=w Cfile chmod Damian=r Bfile Dfile chmod Damian=w Dfile Regards, Praveen
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.