Explain a scheme of capability list to implement protection, Computer Engineering

Assignment Help:

Describe the scheme of capability lists to implement protection?

Capability lists (C- lists):

These lists are utilized to make sure that uses only access files that are explicitly authorized access. These files contain

(i) files created by a user herself/himself

(ii) files owned by others, for that a user process explicit access privileged granted through other owners.

C-list: A capability is a file access privilege relating capabilities possessed through a user is stored in a capability list. A C-list is a set of pairs{ (file.id, access privileges),.....}

C-lists are generally small in size. It limits the space and time over heads in utilizing them to control file accesses. A c-list is a token representing specific access privileges for an object. An object is any software or hardware entity in the system. A capability possessed through a process. A process possessing, it is a capability for an object can access the object in a way reliable with the access privileges explained in the capability. Therefore maintaining C-lists give:

1. A uniform addressing mechanism for short and long life objects

2. This does not explicitly associate memory along with processes. This associates C-lists along with processes.

3. A process may access objects existing anywhere into the system.


Related Discussions:- Explain a scheme of capability list to implement protection

Advantage of booth and restoring division algorithm, Describe the advantage...

Describe the advantage of using Booth algorithm? Ans:  a) It achieves efficiency in the number of additions needed when the multiplier has a few large blocks of 1's. b) It

Memory that can be used in a 16-bit computer, What is the maximum size of t...

What is the maximum size of the memory that can be used in a 16-bit computer and 32 bit computer? The maximum size of the memory that can be used in a 16-bit computer is 2 memo

How a file can be shared among different users, Discuss the different techn...

Discuss the different techniques with which a file can be shared among different users. Several popular techniques with that a file can be shared among various users are: 1

Explain functions introduction, Common used functions are placed within lib...

Common used functions are placed within libraries in the SQABasic directory. Files ending with ".SBH" have the public interface they give to other libraries and scripts. Files endi

Number conversion, (a) Convert the following number to single precision IEE...

(a) Convert the following number to single precision IEEE 754 based on the procedure described in class and in the notes. Express the result in hexadecimal. Show all your work.

K map explanation, K map explanation for mod 5 up synchronous counter ?

K map explanation for mod 5 up synchronous counter ?

Define the term web service with example, Define the term web service with ...

Define the term web service with example. A web service is an application that operate over a network-typically, over the Internet. Most typically, a web service is an API that

Can we delete a domain, Can you delete a domain, which is being used by dat...

Can you delete a domain, which is being used by data elements? No.

Write a recursive algorithm, Write a recursive algorithm to count the numbe...

Write a recursive algorithm to count the number of right children in a binary search tree. Write the method levelCount whose header is given below. Method levelCount returns

War (write after read) - data hazards , WAR (write after read) - Data hazar...

WAR (write after read) - Data hazards in computer architecture: WAR (write after read) - j tries to write at destination before it is read by i , hence i  wrongly gets the n

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd