Corresponding access control matrix, Computer Network Security

Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob owns, but Alice can only read it. Only Cindy can read and write the file cindyrc, which she owns. Assume that the owner of each of these files can execute it.

a) Create the corresponding access control matrix.

b) Cindy gives Alice permission to read cindyrc, and Alice removes Bob's ability to read alicerc. Show the new access control matrix.

c) Show the access control list for the latter scenario (you do not need to draw a diagram - just list the different entries).

Posted Date: 3/15/2013 5:54:47 AM | Location : United States







Related Discussions:- Corresponding access control matrix, Assignment Help, Ask Question on Corresponding access control matrix, Get Answer, Expert's Help, Corresponding access control matrix Discussions

Write discussion on Corresponding access control matrix
Your posts are moderated
Related Questions
Question 1 Explain the types of threats (Attacks) Question 2 What are the Characteristics of Good Encryption Technique? Question 3 Write a note on Digital Signatur

Q. Explain the random key distribution? The triple key management mechanisms ensure a better and complete security solution using the random key distribution mechanism. In this

Question: Human telephone conversations are characterized by irregular pauses, alternating with irregular bursts of speech. In contrast, communication via computers is char

Discuss the risks of having a single root user

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption te

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

ADDRESS MASKS To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the

1. Network Design Design your network giving appropriate IP addresses for your hosts. Provide a topology and table showing your addressing scheme. 2. F i re wall po

how did slavery influence life in the colonies

Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r