Two different protection mechanisms that we have discussed are capabilities and access- control lists. For each of

Question:

Two different protection mechanisms that we have discussed are capabilities and access- control lists. For each of the following protection problems, tell which of these mechanisms can be used.
(a) Ken wants his files readable by everyone except his office mate.
(b) Mitch and Steve want to share some secret files.
(c) Linda wants some of her files to be public.
Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Modern Operating Systems

ISBN: 978-0133591620

4th edition

Authors: Andrew S. Tanenbaum, Herbert Bos

Question Posted: