You are tasked with setting up protection within a new project, and you are trying to decide on a formal security model to protect the resources (e.g., files). The two options are to implement an access matrix using the following: Access lists that are associated with objects. Capabilities that are associated with domains. Compare the strengths and weaknesses of each type of implementation
You are tasked with setting up protection within a new project, and you are trying to decide on a formal security model to protect the resources (e.g., files). The two options are to implement an access matrix using the following: Access lists that are associated with objects. Capabilities that are associated with domains. Compare the strengths and weaknesses of each type of implementation
Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
Related questions
Question
100%
- You are tasked with setting up protection within a new project, and you are trying to decide on a formal security model to protect the resources (e.g., files). The two options are to implement an access matrix using the following:
- Access lists that are associated with objects.
- Capabilities that are associated with domains.
Compare the strengths and weaknesses of each type of implementation
Expert Solution
Step 1
Introduction
Access Matrix: An example of a security model for a computer system's protective state is Access Matrix. A matrix is used to depict it. The permissions of each process running in the realm with regard to each object are specified using an access matrix. The columns of a matrix represent objects, whereas the rows represent domains. Each entry (i, j) describes the collection of actions that a process operating in domains Di can call on object Oj, and each cell of the matrix represents a set of access permissions that are granted to the process of the domain.
Step by step
Solved in 2 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education