Question: Given the protection state shown in Figure and the rules shown in Figure, do the following. a. Explain how S3 can cause the protection state

Given the protection state shown in Figure and the rules shown in Figure, do the following.

a. Explain how S3 can cause the protection state to be changed so that it has write access to F2.

b. Specify two different ways by which S3 can obtain read permission to F1.

c. Explain whether S3 can obtain seek permission to D1 from S1. Why or why not?

S, S, S2 S3 D2 F1 F2 D, block seek control control

S, S, S2 S3 D2 F1 F2 D, block seek control control read* Owner write* wakeup Owner OWner S2 seek* update control stop owner Owner control delete execute S3 Owner Command by So Authorization Effect Rule AIS, XI = A[S, XI Uala*) 1 transfer {ala*) to (S, X) a*e A[Sp, XI A[S, X] = A[S, X) ufala*} owner e A[Sp, X] grant {alu*} to (S, X) controle AIS,, SI AIS, XI = A[S, XI -{a} delete a from (S, X) or owner e A[S,. X]

Step by Step Solution

3.39 Rating (155 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

Here is a solution a S 3 has owner to F 2 so S 3 can grant write to itself be... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Document Format (1 attachment)

Word file Icon

34-E-CE-OS (544).docx

120 KBs Word File

Students Have Also Explored These Related Computer Engineering Questions!