This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: b. Temporal separation separation by time (things run at different times) c. Logical separation No logical connection between the two d. Cryptographic separation (the complexity of a-d increases with the letters descending, also the security decreases as from a-b and b-c) But we also need sharing , otherwise what is the point of having an operating system. Options: 1. Do nothing 2. Isolate processes that are unaware of each other 3. Share all 4. Share nothing 5. Share via access limitations (checks allowability of each access based on each object) 6. Share by capabilities (allows dynamic creation of access rights) 7. Limit the use of an object (monitors the usage after access is given to make sure that you arent doing anything bad). The difficulty to implement increases from 1-7, the fineness of the protection also increases from 1-7....
View Full Document
This note was uploaded on 04/20/2010 for the course CECS 478 taught by Professor Englert during the Spring '10 term at CSU Long Beach.
- Spring '10