sq2 - IS2935/TEL2810 Introduction to Security Quiz 2...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Quiz 2 (Total: 15), Oct 4, 2011 Name: 1. Let x and y be subjects, z a subject or object, and r be a read right. Write the following access control command that captures the take rule of the Take-Grant model. Assume that an access control matrix A contains the rights specified in a Take-Grant graph. command take_right ( x , y , z , r ): x takes right r over z from y , provided x has take right over y , and y has r right over z . Answer : command take_right ( x , y , z , r ) if ( take a [ x, y ]) and ( r a [ y, z ]) then Enter r in a [ x, z ] end 2. Write T for True or F for False [F ] Biba’s integrity model can be used to prevent spread of viruses. [T ] Implementation of the BLP model is difficult because of the problems related to poly-instantiation and covert channels . [T ] The reduction of the Turing Machine Halting Problem to the Safety Problem means that if the Safety Problem was decidable then the Turing Machine Halting Problem would also have been decidable. Assume that an object
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 2

sq2 - IS2935/TEL2810 Introduction to Security Quiz 2...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online