Question: I'm having issues how to even work this problem out. All the information that has been attached also has pics that are needed. I'm stuck

I'm having issues how to even work this problem out. All the information that has been attached also has pics that are needed. I'm stuck with not knowing any of this information

Problem 1.

Access Control Assumption: Privileges: read ("R"), write ("W"), execute ("X") Resources: - Document files: syllabus.doc, ch1.ppt - Image files: trees.jpg, jkim.png, csci563.gif - Binary files: prog1.exe, chrome.exe, wireshark.exe Access permissions (for users A, B, and C): - A has privilege to read all image files. - C has privilege to read and write all document files. - A and B have privilege to read "syllabus.doc" - A and C have privilege to read and execute "prog1.exe", "chrome.exe". - B and C have privilege to read csci563.gif. a. Construct the corresponding access control matrix.

To answer, use the format in Table 1.1 in the textbook. b. Construct the corresponding access control list.

To answer, use the format in Figure 1.5 in the textbook. c. Construct the corresponding capabilities list. To answer, use the format in Figure 1.6 in the textbook.

Problem 2. Vernam Cipher

Suppose the following table for encoding and decoding.

Letter

A

E

Y

M

O

R

H

L

Binary

000

001

010

011

100

101

110

111

Assume a message M is 'MORAL' and the key is 'HELLO'. What is the ciphertext C? Show your work.

Now assume a ciphertext C is 'HYMYR' and the key is 'HELLO'. What is the plaintext P? Show your work.I'm having issues how to even work this problem out. All theinformation that has been attached also has pics that are needed. I'm

Figure 5: The access control lists (ACLs) corresponding to the access control matrix of Table 1 . We use the shorthand notation of r=read, w= write, and x= execute. Figure 6: The capabilities corresponding to the access control matrix of Table 1 . We use the shorthand notation of r=read,w= write, and x= execute. Here are the table and figures mentioned in Assignment 1. Table 1: An example access control matrix. This table lists read, write, and execution (exec) access rights for each of four fictional users with respect to one file, letc/passwd, and three directories

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!