Corresponding access control matrix, Computer Network Security

Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob owns, but Alice can only read it. Only Cindy can read and write the file cindyrc, which she owns. Assume that the owner of each of these files can execute it.

a) Create the corresponding access control matrix.

b) Cindy gives Alice permission to read cindyrc, and Alice removes Bob's ability to read alicerc. Show the new access control matrix.

c) Show the access control list for the latter scenario (you do not need to draw a diagram - just list the different entries).

Posted Date: 3/15/2013 5:54:47 AM | Location : United States







Related Discussions:- Corresponding access control matrix, Assignment Help, Ask Question on Corresponding access control matrix, Get Answer, Expert's Help, Corresponding access control matrix Discussions

Write discussion on Corresponding access control matrix
Your posts are moderated
Related Questions
?Examples should include direct costs items, indirect costs items, as well as variable costing. ?What are at least 5 types of expenses that are associated with manufacturing the

Scenario: A network with individual hosts (really, virtual machines) can run HTTP (web) servers that are available to the outside. (Here, available means the ability to read and wr

For simplicity, each character is regarded as one data packet, which means that the data in each packet should have the max length of only 1 byte. Your own packet header (not th

Problem 1: What is the function of AUC in the GSM architecture? Explanation of HLR(AUC) Architecture of GSM Problem 2: Show the layered architecture of t

TOKEN RING Many LAN methods that are ring topology need token passing for synchronized access to the ring. The ring itself is acts as a single shared communication phase. Both

Feasibility Studies Before deciding on strategy, all information of economic or non economic consequences of vulnerability of information asset should be explored. A number of w

Question: (a) Describe fully with example the two access control methods available to implement database security. (b) Discuss why database statistics (meta data) provide es

Consider the following case study: In order to avoid criticisms of their existing manned road-toll payment system on its private road, WS-Pass has decided to adopt an automated

Problem (a) As a forensic investigator, you are needed to trace the source of an email. It is suspected that the email header has been forged. Show how you would proceed to

ADDRESS RESOLUTION WITH TABLE LOOKUP : Resolution needs data structure that has information about address binding. A distinct address-binding table is used for every physical n