Corresponding access control matrix, Computer Network Security

Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob owns, but Alice can only read it. Only Cindy can read and write the file cindyrc, which she owns. Assume that the owner of each of these files can execute it.

a) Create the corresponding access control matrix.

b) Cindy gives Alice permission to read cindyrc, and Alice removes Bob's ability to read alicerc. Show the new access control matrix.

c) Show the access control list for the latter scenario (you do not need to draw a diagram - just list the different entries).

Posted Date: 3/15/2013 5:54:47 AM | Location : United States







Related Discussions:- Corresponding access control matrix, Assignment Help, Ask Question on Corresponding access control matrix, Get Answer, Expert's Help, Corresponding access control matrix Discussions

Write discussion on Corresponding access control matrix
Your posts are moderated
Related Questions
ASSET IDENTIFICATION AND VALUATION This process begins with identification of assets that includes all elements of an organization’s system (people, procedures, data and informa

Question: a) Explain what the following intermediate systems are and how they work? i. Repeater ii. Bridge b) A service is formally specified by a set of primitives (op

Social Network development in Java: Project Title: SUGGESTLOCAL (Nov 2006-April 2007) Role             : Developer Domain        : Social Network Client          :

Write Pseudocode for the password guessing algorithm: Consider the following authentication protocol: Client Transmission Host


Problem 1: List measurable entities on which the quality of service in a data communication network depends Problem 2: Show the features of a typical Network Management

Five years ago, Calgary Kids' Cloth Ltd was just a small retail store in downtown Calgary. The company started their own factory in SE Calgary to produce outdoor clothes for kids.

Short term Scheduler function , also shown as a dispatcher runs most frequently, and creates the finest-grained decision of which program could run next. This scheduler is called

Example : Softbank – theft of consumer data for extortion Softbank of Japan offers broadband Internet services across Japan through 2 subsidiaries – Yahoo! BB and Softbank BB. I

what is the guaranteed quality of this coursework? how many days it take for 10-12 pages? how much will be? thanks