This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: b. Temporal separation – separation by time (things run at different times) c. Logical separation – No logical connection between the two d. Cryptographic separation (the complexity of a-d increases with the letters descending, also the security decreases as from a-b and b-c) But we also need sharing , otherwise what is the point of having an operating system. Options: 1. Do nothing 2. Isolate processes that are unaware of each other 3. Share all 4. Share nothing 5. Share via access limitations (checks allowability of each access based on each object) 6. Share by capabilities (allows dynamic creation of access rights) 7. Limit the use of an object (monitors the usage after access is given to make sure that you aren’t doing anything bad). The difficulty to implement increases from 1-7, the fineness of the protection also increases from 1-7....
View Full Document
- Spring '10
- Computer Security, potential covert channels, Shareable I/O Devices, Shared resource matrix, general purpose operating