What are the steps involved in designing an access matrix wi

What are the steps involved in designing an access matrix with domains and objects to illustrate the principle of least privilege for a given program? The program may have several sequential logical phases where read and write operations are performed on files

Solution

Domain of Protection

Domain Structure


Figure 14.1 - System with three protection domains.

An Example: UNIX

An Example: MULTICS


Figure 14.2 - MULTICS ring structure.

Access Matrix


Figure 14.3 - Access matrix.


Figure 14.4 - Access matrix of Figure 14.3 with domains as objects.


Figure 14.5 - Access matrix with copy rights.


Figure 14.6 - Access matrix with owner rights.


Figure 14.7 - Modified access matrix of Figure 14.4

Implementation of Access Matrix

Global Table

Access Lists for Objects

Capability Lists for Domains

Lock-Key Mechanism

Comparison

What are the steps involved in designing an access matrix with domains and objects to illustrate the principle of least privilege for a given program? The progr

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site