Mechanisms of protection and policies of protection

Assignment Help Operating System
Reference no: EM13861828

Part 1: Concepts

Please answer the following questions in complete sentences. Your answer for each question should be about 150 words.

1. Why is it important to distinguish between mechanisms of protection and policies of protection?
2. What is an access matrix, and how can it be implemented?
3. How does a virus differ from a worm?
4. What is the difference between symmetric encryption and asymmetric encryption?
5. What are the two main varieties of authentication algorithms?

Part 2: Research Project

In Part 2, you will investigate technical problems of operating systems, and provide a written report. Your research should focus on an in-depth topic about theories, algorithms, approaches, mechanisms, or implementation of one of the following fields of operating systems:
• process management
• process and thread
• CPU scheduling
• synchronization
• deadlock handling
• storage management
• main memory
• virtual memory
• file systems
• mass-storage and I/O
• protection and security
• distributed, real-time, and multimedia systems

Your topic could come from a sub-problem of cutting-edge research problems discussed in the literature (i.e., investigating a technical problem).

If you have trouble deciding what topic to work on, contact your tutor, who can advise you on the suitability of the topic and/or suggest modifications. Note that topic selection is part of your assignment requirements for this project, so you cannot rely on your tutor to assign a topic.

To ensure that your topic has adequate depth and coverage, you MUST write a one-page proposal that outlines your area of interest and associated references you will use. Send it to your tutor for consideration before you begin your project work, preferably allowing at least two weeks for consultation.

In your paper (expectations outlined below), make sure you highlight your work and outcomes in your own words. You must also properly cite any viewpoints, methods, algorithms, data, results, figures, tables, etc. that you borrow from other papers or contributors that you discuss or include in your paper/report. All references cited should be published, or at least be publicly available, stable, and accessible online (referenced in APA or IEEE Style). Using the work of others without proper credit in your paper/report may lead to a form of plagiarism, which is not tolerated in AU courses. Please review the Student Academic Misconduct Policy for more details.

Research Paper

Your investigation will be based on recent publications (i.e., published in the past five years) such as journal/conference papers and technical documents, and the applicable software packages (open source preferred). You are encouraged to read some papers about new techniques in operating systems. You can access the following resources via the ACM Digital Library and IEEE/IEE Electronic Library databases in the Athabasca University Library.

SOSP: ACM Symposium on Operating Systems Principles (ACM) ACM SIGOPS Operating Systems Review (ACM) ACM Transactions on Computer Systems (ACM) IEEE Transactions on Computers (IEEE) ACM Computing Surveys (ACM) Communications of the ACM (ACM) IEEE Computer. . . (IEEE) Linux Journal (ACM)

Once you have chosen your topic, you need to identify meaningful, feasible outcomes for your research on the topic. Overall, the outcomes should interest and benefit the professional community of operating system research and development. Some possible outcomes:
• analysis, findings, and discovery of problems.
• results of your tests, surveys, and comparative analysis.
• proposals for new or improved methods, algorithms, etc.
• meaningful implementation plans.
• insight on future directions.

Present the outcomes of your research in a 10- to 15-page paper written in a journal or conference paper format. References should be cited using APA or IEEE Style. Your paper should include the following sections:
• Title
• Abstract: no more than 300 words.
• Introduction/background: motivation for research and introduction to the outcomes, including a literature review and reference citations.
• Methods: describe the problem and the methods you used to explore or address the problem.
• Results and findings: research results or exploration findings, including theoretical analysis and any experimental and implementation results you accomplished based on your methods.
• Related work: summarize related work by others; compare your methods and results with others' work. Cite your references.
• Conclusion and future work: conclude your exploration and research, and suggest possible future work on the topic.
• References: include all references cited in your paper, using APA or IEEE Style.
• Appendix: Includes a list of your data, design/implementation, and source codes (as applicable), and software necessary for running your programs (if applicable). The Appendix isn't part of the page count for your paper.

Reference no: EM13861828

Questions Cloud

Present value of the net benefits for the use of resources : Suppose the MWTP in periods 1 (now) and 2 (one year from now) is given by P = 8-0.4q. Marginal extraction cost = $2. r = 20%. The available supply is 20 units. Calculate the allocation of outputs across the two periods that maximizes the present valu..
Draw bills in difference map : Suppose that Bill cares only about chai and bagels. Her utility function is U=CB, where C is the number of cups of chai she drinks in a day, and B is the number of bagels she eats in a day. Draw Bills in difference MAP. Set up Bills optimization prob..
Effect of physical activities on psychological wellbeing : Write an Educational paper on given topic- Topic: Effect of physical activities on psychological wellbeing/functioning
How qualitative method use together with quantitative method : Discuss how qualitative methods can be used together with quantitative methods by discussing the logic of mixed methods (in Caracelli& Greene), addressing issues such as ontology and epistemology.
Mechanisms of protection and policies of protection : Why is it important to distinguish between mechanisms of protection and policies of protection and what is an access matrix, and how can it be implemented?
Consider consumer with utility function : Consider a consumer with utility function u(x1,x2) = x1x2 and income m who faces given prices p1 and p2. What is the effect of the increase in price on the consumption of good 1? How much of this effect in consumption is due to the income effect and ..
Features frequently used in web programming : In this assignment, you will experience some of the C# features frequently used in Web programming.There isn't any client interaction in this assignment; rather,you statically construct some to-do item instances(you create a class named ToDoItem w..
What trends in real gdp have occurred in the time period : What trends in real GDP have occurred in the time period shown in the BEA release highlights document?
Calculate the molarity : Calculate the molarity (M) for each of these solutions--you must show all work in detail to receive credit: (a) 31.45 g of NaCl in 1.75 L, (b) 14.41 g of MgS in 0.850 L, (c) 0.4567 g of CuSO4 in 630 mL, (d) 25.5 mg of NaCN in 7.00 mL

Reviews

Write a Review

Operating System Questions & Answers

  Operating system forensics

Compare and contrast the forensic processes when dealing with Windows-based, Linux-based, and Macintosh-based systems. Explain the challenges of each of these operating systems in regard to system forensics and determine which of these you conside..

  Write a report outlining methods of acquiring image in linux

Write a 300-500 words report outlining two methods of acquiring an image in Linux. Student can use Kali and Ubuntu Linux virtual machine (VM) images provided in this subject's lab.

  Inter process communication services implementation

You will provide a diagram illustrating the Linux kernel architecture and various components and classify it according to what we discussed in class, Inter Process Communication services implementation

  Three-process 4 resource system

Give an example of a three-process 4 resource system that is in an unsafe state. Explain why it is in an unsafe state. How many more resources would need to be added to make it a safe state?

  Questions about on ssl

Provide a table showing the Caesar cipher with a key five, and then provide the result of applying this cipher to the text 'I came I saw I conquered'.

  Objectives of database management systems

Discuss the objectives of database management systems, Integrating databases; sharing information; maintaining integrity; reducing redundancy and enabling database evolution

  C language code that reads a lowercase

Required some guidance writing a program in C code that reads a lowercase string of characters from a text document named "data.txt",

  Question 1a explain two reasons driving the creation of

question 1a explain two reasons driving the creation of processes.b suppose we want a system to have two ready states

  Discuss some of the roles that server operating systems

Discuss some of the roles that server operating systems can provide to a network, such as certificate services, Windows Deployment Services, and application pushing services.

  Develop a checklist that ibm analysts could use

Develop a checklist that IBM analysts could use in consulting projects that could help advice clients as they make a choice between Windows or Linux operating system software for their Web servers

  Computing the access time

Main memory uses a block transfer capability & has 1st word (four bytes) access time of fifty ns and access time for following words as 5 ns.

  Write down the reference string if page size is given

Consider following sequence of memory references from 460-byte program: 10, 11, 104, 170, 73, 309, 185, 245, 246, 434, 458, 364. Write down the reference string, assuming page size of 100 bytes.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd