Create algorithm which generates access control matrix

Assignment Help Data Structure & Algorithms
Reference no: EM1366861

Devise an algorithm that generates an access control matrix A for any given history matrix H of the Chinese Wall model. A significant portion of the grade for this problem involves your justification of your algorithm.

Consider using mandatory access controls an compartments to implement an ORCON control. Assume that there are k different organizations. Organization i will produce n(i,j) documents to be shared with organization j.

a) How many compartments are needed to allow any organization to share a document with any other organization? Show your work.

b) Now assume that organization i will need to share nm(i,i1,...,im) with organizations i¬1,...,im. How many compartments will be needed? Show your work.

Reference no: EM1366861

Questions Cloud

Determining market situation : Describe a market situation in which the operating company faces economic difficulties and need to cut costs. What cost cutting strategies may the operating company employ to remain profitable?
Supply and demand schedule for pizza : Graph the supply and demand schedule for pizza using $5 through $15 as the value of p. In equilibrium, how many pizzas would be sold at what price?
Basis for the historic tension : Write down the basis for the historic tension between the powers of the federal government and powers of states in public health matters? What actions have been taken?
Draw demand curve for bridge crossings : Assume you're in charge of the toll bridge that essentially cost free. The demand for bridge crossings Q is given by P = 60 - 2Q. Draw a demand curve for bridge crossings
Create algorithm which generates access control matrix : Create an algorithm which generates the access control matrix A for any given history matrix H of the Chinese Wall model.
Determine the annualised cost of the loan : Determine the annualised cost of the loan for each of the following outcomes, assuming interest is based on 90 days and a 365 day year
Survival of the military health system : What are the strengths ans threats to the survival of the military health system.
Difference-equilibrium price and equilibrium quantity : Write down the difference between Equilibrium price and Equilibrium quantity. What role does elasticity place?
Write program which will accept list of student-s name : Write a program which will accepts list of student's name, individual scores for quiz1, quiz2 and quiz3. Your program must then compute for average of 3 quizzes.

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Factors-principles considering indecency regulation issues

What factors and principles should the federal government take into account when considering indecency regulation issues?

  Explain sorting algorithm which is optimal in cost

Explain a sorting algorithm which is optimal with respect to this cost model and uses O(n) space. That is, time used by algorithm should exactly match lower bound

  Describe implementation of algorithm on simd computer

Describe an implementation of that algorithm on an SIMD computer where the processors are connected to form a linear array

  Recursive implementation of euclids algorithm

Write a recursive implementation of Euclid's algorithm for finding the greatest common divisor (GCD) of two integers

  Design time randomized monte carlo algorithm

You have to design an O(n) time randomized Monte Carlo algorithm which computes an (1 + o)- approximate ham-sandwich cut with probability 1 - n-c for any given constant c > 0.

  Design algorithm to solve spectral assembly problem

Design an algorithm to solve the Spectral Assembly problem under the above conditions. Does the problem have a unique solution?

  Computing time complexity of procedure

What is the time complexity of the procedure? If A[l .. r] = [24, 30, 09, 46, 15, 19, 29, 86,78], what is the output?

  Creating algorithm broken into sequence of words

Katt wishes you to create an algorithm that, given a string X, determines efficiently how many ways X can be broken up into sequence of words.

  Encryption feistel cipher and decryption algorithm

If this is psudocode for encryption feistel cipher determine decryption algorithm?Output: ciphertext = (left[16], right[16]) Explain pseudo-code of corresponding decryption algorithm for this cipher.

  Algorithm-decide whether language recognized by dfa is empty

Give an algorithm to decide whether the language recognized by a DFA is empty. Given two DFAs M1 and M2, give an algorithm to decide whether L(M1)subset or equal to L(M2).

  Explain the fifo structure of the queue

Explain the FIFO structure of the queue Explain how you would implement the queue data structure in its simplest form. Illustrate your answer fully with the necessary sample code

  Finding equation has no solutions mod m

Let the equation ax = b mod m, where x is unknown and a, b and m are given. Illustrate that this equation has either no solutions mod m, or d solutions mod m.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd