Q 1. Consider the set of rights {read, write, execute, append, list, modify, own}. a. Using...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Q 1. Consider the set of rights {read, write, execute, append, list, modify, own}. a. Using the primitive commands discussed during the online lectures, write a composite command delete_all_rights (p, q, s). This command causes p to delete all rights the subject q has over an object s. b. Modify your command so that the deletion can occur only if p has modify rights over s. c. Modify your command so that the deletion can occur only if p has modify rights over s and q does not have own rights over s. d. Consider a computer system with three users: A, B, and C. A owns the file alicerc, and B and C can read it. C can read and write B's file bobrc, but A can only read it. Only C can read and write her file cyndyrc. Assume that the owner of each of these files can execute it. i. Create the corresponding access control matrix. C gives A permission to read cyndyrc, and A removes B's ability ii. to read alicerc. Show the new access control matrix. [5] Q 2. Given the security levels TOP SECRET, SECRET, CONFIDENTIAL, and UNCLASSIFIED (ordered from highest to lowest), and information categories A, B, and C, specify what type of access (read, write, or both) is allowed by the BLP model in each of the following situations. Assume that discretionary access controls allow anyone access unless otherwise specified. a. Paul, cleared for (TOP SECRET, { A, C }), wants to access a document classified (SECRET, { B, C }). b. Anna, cleared for (CONFIDENTIAL, {C }), wants to access a document classified (CONFIDENTIAL, { B }). c. Jesse, cleared for (SECRET, { C }), wants to access a document classified (CONFIDENTIAL, { C }). d. Sammi, cleared for (TOP SECRET, { A, C }), wants to access a document classified (CONFIDENTIAL,{A }). e. Robin, who has no clearances (and so works at the UNCLASSIFIED level), wants to access a document classified (CONFIDENTIAL, { B }). [5] Q 1. Consider the set of rights {read, write, execute, append, list, modify, own}. a. Using the primitive commands discussed during the online lectures, write a composite command delete_all_rights (p, q, s). This command causes p to delete all rights the subject q has over an object s. b. Modify your command so that the deletion can occur only if p has modify rights over s. c. Modify your command so that the deletion can occur only if p has modify rights over s and q does not have own rights over s. d. Consider a computer system with three users: A, B, and C. A owns the file alicerc, and B and C can read it. C can read and write B's file bobrc, but A can only read it. Only C can read and write her file cyndyrc. Assume that the owner of each of these files can execute it. i. Create the corresponding access control matrix. C gives A permission to read cyndyrc, and A removes B's ability ii. to read alicerc. Show the new access control matrix. [5] Q 2. Given the security levels TOP SECRET, SECRET, CONFIDENTIAL, and UNCLASSIFIED (ordered from highest to lowest), and information categories A, B, and C, specify what type of access (read, write, or both) is allowed by the BLP model in each of the following situations. Assume that discretionary access controls allow anyone access unless otherwise specified. a. Paul, cleared for (TOP SECRET, { A, C }), wants to access a document classified (SECRET, { B, C }). b. Anna, cleared for (CONFIDENTIAL, {C }), wants to access a document classified (CONFIDENTIAL, { B }). c. Jesse, cleared for (SECRET, { C }), wants to access a document classified (CONFIDENTIAL, { C }). d. Sammi, cleared for (TOP SECRET, { A, C }), wants to access a document classified (CONFIDENTIAL,{A }). e. Robin, who has no clearances (and so works at the UNCLASSIFIED level), wants to access a document classified (CONFIDENTIAL, { B }). [5]
Expert Answer:
Answer rating: 100% (QA)
Q1 a Using the syntax in Section 23 write a command deleteallrights p q s This command causes p to d... View the full answer
Related Book For
Principles of Communications Systems, Modulation and Noise
ISBN: 978-8126556793
7th edition
Authors: Rodger E. Ziemer, William H. Tranter
Posted Date:
Students also viewed these computer engineering questions
-
Show a stack implementation of LR parser (bottom up) for the following expression grammar. for the arithmetic grammar: --> TE' E' --> +TE' | epsilon T --> FT' T' --> *FT' | epsilon F --> (E) | id...
-
Do you think we can use Excels Solver to solve simulation models? Why or why not?
-
We can solve linear systems by methods other than Gauss's. One often taught in high school is to solve one of the equations for a variable, then substitute the resulting expression into other...
-
Mary Wells Lawrence once said, In this business, you can never wash the dinner dishes and say they are done. You have to keep doing them constantly. If you were a business executive or information...
-
How much does a sleeping bag cost? Lets say you want a sleeping bag that should keep you warm in temperatures from 20F to 45F. A random sample of prices ($) for sleeping bags in this temperature...
-
Economic profits are: a. accounting profits b. total revenue minus accounting costs c. total revenue minus accounting costs and opportunity costs d. total revenue minus marginal costs
-
In a two-dimensional, incompressible flow field, the \(x\) component of velocity is given by the equation \(u=2 x\). (a) Determine the corresponding equation for the \(y\) component of velocity if...
-
The Shotz Beer Company has breweries in two cities; the breweries can supply the following numbers of barrels of draft beer to the companys distributors each month: Brewery .... Monthly Supply (bbl)...
-
Journalize the entry for the purchase of office supplies on February 13 for $2,300, paying $255 cash and the remainder on account. If an amount box does not require an entry, leave it blank. Feb. 13
-
I. THE CASE 0 n February 15, 2019, the Chief Operating Officer of Larson Industries, Pete Moreen, announced a major step forward for the company: Today, we have entered into an agreement to sell our...
-
Tearming Suppose a scientist identified two yeast mutants, called huh1 and huh2. The mutants have constitutive expression of the nop operon, which includes the genes nop1 and nop2. One of the mutants...
-
Why is it important for the risk management report form to include who is directly responsible for the risk?
-
Kate Thomas, a project manager with Johnson & Rogers Software Engineering, was looking forward to her first project team meeting. She applied quotes to the term meeting because she would not actually...
-
Go to the Web site www.debian.org/devel/leader and evaluate the role of the project leader in the Debian Project. What is it about the duties and background of the project leader that lets us view...
-
Volkswagen obfuscated, they denied, and they ultimately lied. These were the words of U.S. Attorney General Loretta Lynch, as she set out how the German carmaker would be punished for attempting to...
-
In 2011, one of the most complex and difficult congressional budget decisions in years finally determined the fate of the Marine Corps Expeditionary Fighting Vehicle (EFV). Given the numerous delays,...
-
An experiment was run to determine the capillary pressure for a core in the laboratory. The core measurements from previous work were recorded in the table below, along with the capillary pressure...
-
If there is an unrealized holding gain on available-for-sale investments, it is reported as?
-
Assume that a data stream d(t) consists of a random (coin-toss) sequence of + 1s and -1s each of which is T seconds in duration. The auto correlation function for such a sequence is (a) Find and...
-
An FM system operates with the same parameters as given in the preceding drill problem except that the deviation ratio is 5. Determine the channel noise PSD that results in a post detection SNR of 30...
-
The random variable X has a probability-density function uniform in the range 0 x 2 and zero elsewhere. The independent variable Y has a density uniform in the range 1 y 5 and zero elsewhere....
-
Scores for the California Peace Officer Standards and Training test are normally distributed, with a mean of 50 and a standard deviation of 10. An agency will only hire applicants with scores in the...
-
1. Find the z-score that corresponds to a cumulative area of 0.3632. 2. Find the z-score that has 10.75% of the distributions area to its right.
-
Find the z-score that corresponds to each percentile. 1. P 5 2. P 50 3. P 90
Study smarter with the SolutionInn App