14-exr - CHAPTER Protection Practice Exercises 14.1 14.2 14 What are the main differences between capability lists and access lists A Burroughs

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
14 CHAPTER Protection Practice Exercises 14.1 What are the main differences between capability lists and access lists? 14.2 A Burroughs B7000/B6000 MCP Fle can be tagged as sensitive data. When such a Fle is deleted, its storage area is overwritten by some random bits. ±or what purpose would such a scheme be useful? 14.3 In a ring-protection system, level 0 has the greatest access to objects, and level n (greater than zero) has fewer access rights. The access rights of a program at a particular level in the ring structure are considered as a set of capabilities. What is the relationship between the capabilities of a domain at level j and a domain at level i to an object (for j > i )? 14.4 The RC 4000 system (and other systems) have deFned a tree of processes (called a process tree) such that all the descendants of a process are given resources (objects) and access rights by their ancestors only. Thus, a descendant can never have the ability to do anything that its ancestors cannot do. The root of the tree is the operating system, which has the
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/03/2009 for the course IT OS taught by Professor Dr.stephan during the Winter '09 term at Abu Dhabi University.

Page1 / 2

14-exr - CHAPTER Protection Practice Exercises 14.1 14.2 14 What are the main differences between capability lists and access lists A Burroughs

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online