Corresponding access control matrix, Computer Network Security

Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob owns, but Alice can only read it. Only Cindy can read and write the file cindyrc, which she owns. Assume that the owner of each of these files can execute it.

a) Create the corresponding access control matrix.

b) Cindy gives Alice permission to read cindyrc, and Alice removes Bob's ability to read alicerc. Show the new access control matrix.

c) Show the access control list for the latter scenario (you do not need to draw a diagram - just list the different entries).

Posted Date: 3/15/2013 5:54:47 AM | Location : United States







Related Discussions:- Corresponding access control matrix, Assignment Help, Ask Question on Corresponding access control matrix, Get Answer, Expert's Help, Corresponding access control matrix Discussions

Write discussion on Corresponding access control matrix
Your posts are moderated
Related Questions
how much would you charge for minimum 20 pages

W h a t do you understand by the terms security, network security and information security? How network security and information security are connected? Security can be def

NSTISSC SECURITY MODEL The NSTISSC Security Model provides a detailed perspective on security. While the NSTISSC model covers the 3 dimensions of information security, it removes

QUESTION: a) Explain four issues that are generally addressed in the Needs Analysis phase in the building-block approach to network design. b) Sketch a typical hybrid star-b

Question (a) Name 3 popular electronic mail access protocols? (b) i. What is DNS? ii. Briefly, describe what it does and how it works? iii. Why does DNS use a dist

Question: a) What do you meant by Privacy? b) Name the four privacy violations. c) Often, aggregate information and anonymized information can be combined to identif

REASON FOR MULTIPLE TOPOLOGIES Every topology has disadvantages and advantages, which are described below: IN A RING:  It is simple to coordinate access to other dev

Question: Human telephone conversations are characterized by irregular pauses, alternating with irregular bursts of speech. In contrast, communication via computers is char

Repeater known as regenerator ; it is an electronic machine that performs only at physical layer. It gets the signal in the network before it becomes loss or weak, recreates the

QUESTION (a) What do you understand by a VLAN? Provide one advantage of using a VLAN. (b) What is a trunk port in a VLAN? (c) A VLAN will be created using one or more