Question: the attached table are the format for the problem root letc/passwd: r,w,x; /usr/bin: r,w,x; /u/roberto: r,w,x; /admin/: r,w,x mike /usr/passwd: r; /usr/bin: r,x roberto /usr/passwd:

the attached table are the format for the problem root letc/passwd: r,w,x;the attached table are the format for the problem/usr/bin: r,w,x; /u/roberto: r,w,x; /admin/: r,w,x mike /usr/passwd: r; /usr/bin: r,x roberto/usr/passwd: r; /usr/bin: r; /u/roberto: r,w,X backup letc/passwd: r,x; /usr/bin: r,x; /u/roberto:r,x; ladmin/: r,x Figure 6: The capabilities corresponding to the access control

root letc/passwd: r,w,x; /usr/bin: r,w,x; /u/roberto: r,w,x; /admin/: r,w,x mike /usr/passwd: r; /usr/bin: r,x roberto /usr/passwd: r; /usr/bin: r; /u/roberto: r,w,X backup letc/passwd: r,x; /usr/bin: r,x; /u/roberto: r,x; ladmin/: r,x Figure 6: The capabilities corresponding to the access control matrix of Ta- ble 1. We use the shorthand notation of r=read, w=write, and x=execute. Problem 1. Access Control (30 pt., 10 pt. each) Assumption: Privileges: read ("R"), write ("W"), execute ("X") Resources: Image files: tamuc.jpg, jkim.png, csci351.gif Document files: syllabus.doc, lecture.ppt Binary files: a.exe, b.exe, c.exe Access permissions: A has privilege to read all the image files. B has privilege to read and write all the document files. A and C have privilege to read syllabus.doc" A and B have privilege to read and execute a.exe, b.exe". B and C have privilege to read tamuc.jpg. a. Construct the corresponding access control matrix. To answer, use the format in Table 1.1 in the textbook. b. Construct the corresponding access control list. To answer, use the format in Figure 1.5 in the textbook. C. Construct the corresponding capabilities list. To answer, use the format in Figure 1.6 in the textbook. fictional file system and a set of users in Table 1. /u/roberto/ read, write, exec ladmin/ read, write, exec root mike roberto backup letc/passwd read, write read read read /usr/bin/ read, write, exec read, exec read, exec read, exec read, write, exec read, exec read, exec M Introduction letc/passwd /usr/bin/ /u/roberto/ ladmin/ root: r,w mike: r roberto: r backup: r root: r,W,X backup: r,x root: r,w,X mike: r,x roberto: r,x backup: r,x root: r,w,X roberto: r,w,x backup: r,x Figure 5: The access control lists (ACLs) corresponding to the access control matrix of Table 1. We use the shorthand notation of r=read, w=write, and x=execute. root letc/passwd: r,w,x; /usr/bin: r,w,x; /u/roberto: r,w,x; /admin/: r,w,x mike /usr/passwd: r; /usr/bin: r,x roberto /usr/passwd: r; /usr/bin: r; /u/roberto: r,w,X backup letc/passwd: r,x; /usr/bin: r,x; /u/roberto: r,x; ladmin/: r,x Figure 6: The capabilities corresponding to the access control matrix of Ta- ble 1. We use the shorthand notation of r=read, w=write, and x=execute. Problem 1. Access Control (30 pt., 10 pt. each) Assumption: Privileges: read ("R"), write ("W"), execute ("X") Resources: Image files: tamuc.jpg, jkim.png, csci351.gif Document files: syllabus.doc, lecture.ppt Binary files: a.exe, b.exe, c.exe Access permissions: A has privilege to read all the image files. B has privilege to read and write all the document files. A and C have privilege to read syllabus.doc" A and B have privilege to read and execute a.exe, b.exe". B and C have privilege to read tamuc.jpg. a. Construct the corresponding access control matrix. To answer, use the format in Table 1.1 in the textbook. b. Construct the corresponding access control list. To answer, use the format in Figure 1.5 in the textbook. C. Construct the corresponding capabilities list. To answer, use the format in Figure 1.6 in the textbook. fictional file system and a set of users in Table 1. /u/roberto/ read, write, exec ladmin/ read, write, exec root mike roberto backup letc/passwd read, write read read read /usr/bin/ read, write, exec read, exec read, exec read, exec read, write, exec read, exec read, exec M Introduction letc/passwd /usr/bin/ /u/roberto/ ladmin/ root: r,w mike: r roberto: r backup: r root: r,W,X backup: r,x root: r,w,X mike: r,x roberto: r,x backup: r,x root: r,w,X roberto: r,w,x backup: r,x Figure 5: The access control lists (ACLs) corresponding to the access control matrix of Table 1. We use the shorthand notation of r=read, w=write, and x=execute

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!