CSCI 4531 Lecture Notes - Lecture 8: Inode, Terminate And Stay Resident Program, Unique User

38 views4 pages

Document Summary

The figure below is an example of an access matrix and shows a visual representation of how certain users in a system are given access to certain files. ** there is also an example of access control structures in the slides ** ** as shown in the slides, figure 4. 3, it is shown that a subject can have control over another subject, in addition to processes, files, processes, and disk drives ** ** table 4. 2 shows that certain subjects can grant or transfer certain controls to other subjects, destroy certain objects, and even destroy certain subjects ** Set of objects together with access rights to those objects. More flexibility when associating capabilities with protection domains. In terms of the access matrix, a row defines a protection domain. User can spawn processes with a subset of the access rights of the user. Association between a process and a domain can be static or dynamic.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents