Explain a scheme of capability list to implement protection, Computer Engineering

Assignment Help:

Describe the scheme of capability lists to implement protection?

Capability lists (C- lists):

These lists are utilized to make sure that uses only access files that are explicitly authorized access. These files contain

(i) files created by a user herself/himself

(ii) files owned by others, for that a user process explicit access privileged granted through other owners.

C-list: A capability is a file access privilege relating capabilities possessed through a user is stored in a capability list. A C-list is a set of pairs{ (file.id, access privileges),.....}

C-lists are generally small in size. It limits the space and time over heads in utilizing them to control file accesses. A c-list is a token representing specific access privileges for an object. An object is any software or hardware entity in the system. A capability possessed through a process. A process possessing, it is a capability for an object can access the object in a way reliable with the access privileges explained in the capability. Therefore maintaining C-lists give:

1. A uniform addressing mechanism for short and long life objects

2. This does not explicitly associate memory along with processes. This associates C-lists along with processes.

3. A process may access objects existing anywhere into the system.


Related Discussions:- Explain a scheme of capability list to implement protection

Determine the frequency of the input signal, An eight stage ripple counter ...

An eight stage ripple counter uses a flip-flop with propagation delay of 75 nanoseconds.  The pulse width of the strobe is 50ns.  The frequency of the input signal which can be use

Garbage collector to free the memory, In .NET Compact Framework, can I free...

In .NET Compact Framework, can I free memory explicitly without waiting for garbage collector to free the memory?  Yes you can clear the memory using gc.collect method but it i

Level of any node of a tree, Level of any node of a tree is :- Its distanc...

Level of any node of a tree is :- Its distance from the root

What are the features of abap/4 dictionary, What are the features of ABAP/4...

What are the features of ABAP/4 Dictionary? The most significant features are: Integrated to aABAP/4 Development Workbench. Active in the runtime environment.

Identify the number of control lines for 16 to 1 multiplexer, The number of...

The number of control lines for 16 to 1 multiplexer is ? Ans. We have 16 = 2 4 , 4 Select lines are needed.

Computers, Purpose: Front line client service. Make bookings for vehicle se...

Purpose: Front line client service. Make bookings for vehicle servicing, accesses client database, prints invoices for clients etc. The mechanics complete worksheets for the variou

Which technique are used to gain on the number pairs, Explain the technique...

Explain the techniques, which are used to gain on the number pairs. In rural areas, subscribers are usually dispersed. This is both unessential and expensive to give a dedicate

Resolution method, Resolution Method: For a minor miracle occurred in ...

Resolution Method: For a minor miracle occurred in 1965 where Alan Robinson published his resolution method as uses a method to generalised version of the resolution rule of i

Assembly language programming, write an assembly language program for fibon...

write an assembly language program for fibonacci series?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd