CSCI 4531 Lecture Notes - Lecture 8: Inode, Terminate And Stay Resident Program, Unique User
Document Summary
The figure below is an example of an access matrix and shows a visual representation of how certain users in a system are given access to certain files. ** there is also an example of access control structures in the slides ** ** as shown in the slides, figure 4. 3, it is shown that a subject can have control over another subject, in addition to processes, files, processes, and disk drives ** ** table 4. 2 shows that certain subjects can grant or transfer certain controls to other subjects, destroy certain objects, and even destroy certain subjects ** Set of objects together with access rights to those objects. More flexibility when associating capabilities with protection domains. In terms of the access matrix, a row defines a protection domain. User can spawn processes with a subset of the access rights of the user. Association between a process and a domain can be static or dynamic.