Explain a scheme of capability list to implement protection, Computer Engineering

Assignment Help:

Describe the scheme of capability lists to implement protection?

Capability lists (C- lists):

These lists are utilized to make sure that uses only access files that are explicitly authorized access. These files contain

(i) files created by a user herself/himself

(ii) files owned by others, for that a user process explicit access privileged granted through other owners.

C-list: A capability is a file access privilege relating capabilities possessed through a user is stored in a capability list. A C-list is a set of pairs{ (file.id, access privileges),.....}

C-lists are generally small in size. It limits the space and time over heads in utilizing them to control file accesses. A c-list is a token representing specific access privileges for an object. An object is any software or hardware entity in the system. A capability possessed through a process. A process possessing, it is a capability for an object can access the object in a way reliable with the access privileges explained in the capability. Therefore maintaining C-lists give:

1. A uniform addressing mechanism for short and long life objects

2. This does not explicitly associate memory along with processes. This associates C-lists along with processes.

3. A process may access objects existing anywhere into the system.


Related Discussions:- Explain a scheme of capability list to implement protection

What is difference between ram and fifo, What is difference between RAM and...

What is difference between RAM and FIFO? FIFO certainly does not have address lines. It is stands for first in and first out. It is an algorithm based method. It is used to s

Control of program, Example:                         CMP    AX,BX    ;...

Example:                         CMP    AX,BX    ; compare instruction: sets flags JE        THERE    ; if equal then skip the ADD instruction  ADD  AX, 02    ; add 02

What are the main features of uml, What are the main features of UML ...

What are the main features of UML Defined system structure for the object modelling Support for all different model organization Strong modelling for behaviour an

C++, #question.constructors and destructors

#question.constructors and destructors

Determine octant to hexadecimal conversion, What is the Octant to hexadecim...

What is the Octant to hexadecimal conversion of 734 ? Ans. (734) 8      = (1 D C) 16 0001 ¦ 1101 ¦ 1100 1         D         C

What is exception, a. Explain about exception? When do they occur? Show usi...

a. Explain about exception? When do they occur? Show using an example how to give your own exception handler. b. Can you restrict the types of exception that a function can thro

Explain the method to identify the object classes, Explain the method to id...

Explain the method to identify the Object Classes You would always be careful while identifying relevant object classes from application domain. Objects may include physical e

Depth - basic characteristics of an experts system, An expert system has d...

An expert system has death that is it operate effectively in a narrow domain containing difficult challenging problems. Thus the rules in an experts systems are necessarily co

Explain pure and impure interpreters, Explain Pure and impure interpreters ...

Explain Pure and impure interpreters In a pure interpreter, the source program is retained into the source form all throughout its interpretation. These arrangements incur subs

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd