Create algorithm which generates access control matrix

Assignment Help Data Structure & Algorithms
Reference no: EM1366861

Devise an algorithm that generates an access control matrix A for any given history matrix H of the Chinese Wall model. A significant portion of the grade for this problem involves your justification of your algorithm.

Consider using mandatory access controls an compartments to implement an ORCON control. Assume that there are k different organizations. Organization i will produce n(i,j) documents to be shared with organization j.

a) How many compartments are needed to allow any organization to share a document with any other organization? Show your work.

b) Now assume that organization i will need to share nm(i,i1,...,im) with organizations i¬1,...,im. How many compartments will be needed? Show your work.

Reference no: EM1366861

Questions Cloud

Determining market situation : Describe a market situation in which the operating company faces economic difficulties and need to cut costs. What cost cutting strategies may the operating company employ to remain profitable?
Supply and demand schedule for pizza : Graph the supply and demand schedule for pizza using $5 through $15 as the value of p. In equilibrium, how many pizzas would be sold at what price?
Basis for the historic tension : Write down the basis for the historic tension between the powers of the federal government and powers of states in public health matters? What actions have been taken?
Draw demand curve for bridge crossings : Assume you're in charge of the toll bridge that essentially cost free. The demand for bridge crossings Q is given by P = 60 - 2Q. Draw a demand curve for bridge crossings
Create algorithm which generates access control matrix : Create an algorithm which generates the access control matrix A for any given history matrix H of the Chinese Wall model.
Determine the annualised cost of the loan : Determine the annualised cost of the loan for each of the following outcomes, assuming interest is based on 90 days and a 365 day year
Survival of the military health system : What are the strengths ans threats to the survival of the military health system.
Difference-equilibrium price and equilibrium quantity : Write down the difference between Equilibrium price and Equilibrium quantity. What role does elasticity place?
Write program which will accept list of student-s name : Write a program which will accepts list of student's name, individual scores for quiz1, quiz2 and quiz3. Your program must then compute for average of 3 quizzes.

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Determine computational complexity of algorithm

Describe the algorithm in psuedo-code. You should give thought to what data structures(s) make sense for e client implementation. Determine computational complexity of your algorithm.

  Use a search tree to find the solution

Explain how will use a search tree to find the solution.

  Write algorithm using pseudo code consensus algorithm

Write an algorithm, using pseudo code, "Consensus algorithm": A group of ten people need to decide which one flavor of ice cream they will all order, out of three options.

  Write algorithm find intersection of two singly-linked list

Write an algorithm (pseudocode) to find the intersection of two singly-linked lists. Assume that the data in each list are in nondecreasing order.

  Algorithm for finding smallest element in unsorted array

Consider the following algorithm for finding the smallest element in an unsorted array: RANDOMMIN(A[1 .. n]). What is the exact expected number of executions of line ( )?

  Compare the average behavior of insertion sort

Compare the average behavior of insertion sort for n elements with that of the n insertions into an initially-empty straight array implementation of a priority queue

  Implement a queue as a circular array

Implement a queue as a circular array as follows: Use two index variables head and tail that contain the index of the next element to be removed and the next element to be added.

  Addition and subtraction of numbers in binary

Addition and Subtraction of numbers in binary and round to the nearest decimal number with three significant decimal digits

  Dynamic-programming algorithm for rod-cutting problem

Consider a modification of the rod-cutting problem in which, in addition to a price pi for each rod, each cut incurs a fixed cost of c. Give a dynamic-programming algorithm to solve this modified problem.

  Calculate the size of the state space as a function of n

n vehicles occupy squares (1, 1) through ( n , 1) (i.e., the bottom row) of an n × n grid. The vehicles must be moved to the top row but in reverse order

  Simplify rsa cryptosystem using prime number

Assume we tried to simplify RSA cryptosystem using just prime p instead of composite modulus N = pq. As in RSA, we would have encryption exponent.

  Design of sample and hold amplifiers for 100 msps by using n

The report is divided into four main parts. The introduction about sample, hold amplifier and design, bootstrap switch design followed by simulation results.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd