Corresponding access control matrix, Computer Network Security

Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob owns, but Alice can only read it. Only Cindy can read and write the file cindyrc, which she owns. Assume that the owner of each of these files can execute it.

a) Create the corresponding access control matrix.

b) Cindy gives Alice permission to read cindyrc, and Alice removes Bob's ability to read alicerc. Show the new access control matrix.

c) Show the access control list for the latter scenario (you do not need to draw a diagram - just list the different entries).

Posted Date: 3/15/2013 5:54:47 AM | Location : United States







Related Discussions:- Corresponding access control matrix, Assignment Help, Ask Question on Corresponding access control matrix, Get Answer, Expert's Help, Corresponding access control matrix Discussions

Write discussion on Corresponding access control matrix
Your posts are moderated
Related Questions
QUESTION 1 Risk analysis helps companies prioritize their risks and shows management the amount of money that should be applied to protecting against those risks in a sensib

SUCCESS OF IP:  IP has accommodated dramatic modification since real design. But basic rules are still appropriate today. There are many new kinds of hardware. SCALING:

Question: A regional police force has the following corporate objectives: ? to reduce crime and disorder; ? to promote community safety; ? to contribute to delivering just

Write down the significance of the syntax conversion . Syntax Conversion is described below: Syntax conversion is a significant function carried out in the presentation layer. I

Limitations of firewall Firewalls cannot protect a network if security rules are not followed properly by an organization or if the rules are not defined properly. Firewalls ar

Documenting the Results of Risk Assessment The goal of this process is to recognize the information assets, list them, and rank according to those most required protection. The

SDLC Systems development life cycle (SDLC) is process of developing information systems through analysis, design, investigation, implementation and maintenance. SDLC is called as

Question: a) Give two reasons why the building-block approach is favoured to the traditional network design approach. b) With reference to network monitoring parameters, dis

Question (a) Draw a typical hybrid star-ring topology paying attention to how the clients and switching hubs are connected. (b) State 3 main differences between a router

how can you enter the ASVAB practice test on line?