What needs to be done to the matrix

Assignment Help Programming Languages
Reference no: EM13673299

Given the following command for the HRU Access Control Matrix model:

command do-something(sub0; sub1; o)

if f in a[sub0; sub1] and m in a[sub1; sub0]

then

createobject

end

1. Given the following matrix, show the result (modified matrix) after executing/ calling the commanddo-something(A; B;Obj5)

 

Obj1

Obj2

Obj3

Obj4

...

A

B

C

. . .

A

r

rw

rw

rwx

...

m

f

 

 

B

w

w

wx

 

...

m

 

 

 

C

w

r

r

r

...

f

 

 

 

. . .

 

 

 

 

...

 

 

 

 

Where (r:  read, w: write, x: execute, m: modify, f: function) and sub stands for subject, A,B,C are subjects, and Obj stands for Objects

do-something(A;B;Obj5) is a call to the command with the arguments A,B,Obj5

2. Using the syntax in Section 2.3. Write a command delete_object(sub1,sub1) that will delete any occurrences of sub1 if sub1has the right m with itself

3. How will the matrix above result if we execute the command in question 2 for each subject. Hint: it will only succeed in one occurrence

4. Suppose we have a security policy that enforces integrity to its maximum. What needs to be done to the matrix above for enforcing this policy?

Reference no: EM13673299

Questions Cloud

Actual and projected sales follow : Actual and projected sales follow.
What is executable space protection : What is a buffer overflow attack, and what can be done to prevent them? Consider this question in terms of both the application and the hardware architecture/system itself.
Companies that engage in long-term sales : Companies that engage in long-term sales contracts such as construction projects often use the percentage of completion method to recognize revenue. This means that revenue is recognized in proportion to the project's completion. True or False..
How to identify udp socket and how to identify a tcp socket : How to identify a UDP socket and how to identify a TCP socket - Compare two pipelining protocols shown in the textbook
What needs to be done to the matrix : How will the matrix above result if we execute the command - What needs to be done to the matrix above for enforcing this policy?
Derive the firms inverse demand for labor : Derive the firm's inverse demand for labor in the short run and derive the firm's inverse demands for labor and capital in the long run.
Compute the taxable income for 2014 : Compute the taxable income for 2014
Two masses are suspended with cord that passes over a pulley : Two masses are suspended with cord that passes over a pulley with negligible mass. The cord also has negligible mass. One of the masses, m1, has a mass of 6.0 kg and the other mass, m2, has a mass of 4.0 kg. The force of the cord attached to m1 is:
What is their recognized gain : What is their recognized gain?

Reviews

Write a Review

Programming Languages Questions & Answers

  Write an anonymous block that places a substitution variable

Write an anonymous block that places a substitution variable (&) into a local variable of type varchar2. You will need to convert the types and round them to nearest tens unit. For example 84.4555 would be 84.5.

  Write an assembly code segment that calls the subroutine

Write an assembly code segment that calls the subroutine New Functionif bits 5 and 6 of PORTD equal 1 and write the same code segment in part (a) using structured assembly constructs.

  Design recursive program to generate random blurbs

A Whoozit is the character 'x' followed by zero or more 'y's. A Whatzit is a 'q' followed by either a 'z' or a 'd', followed by a Whoozit. Design and implement a recursive program that generates random Blurbs in this alien language.

  Program to overload addition operator

The class should also provide the following overloaded operator capabilities: Overload the addition operator (+) to add two Polynomials.

  Correspondence between a grammar and a type

Identity the correspondence between a grammar and a type and identify the correspondence between a grammar and a recursive-descent parser.

  Javascript function for cookie added to user-s computer

JavaScript function has verified that all the required fields have been filled, cookie is added to user's computer. If same user attempts to fill out form second time.

  Program to generate a random number between a range

Write down a program to generate random number between 1 and 100 and asks user to guess what number is.

  Write program to compute and outputs the average gpa

Write a program that computes and outputs the average GPA for both female and male students. Format your results to two decimal places. Your program should use the functions.

  Create application which gets customer account data

Some interest Credit Company gives loans to customers at 1.5 percent interest per month. Create the application which gets customer account data which includes the account number, customer name, and balance due.

  Explaining exception handling using program

Use exception handling appropriately. Use comments to illustrate the various concepts applied / utilized in the solution.

  Find use of dom to change the contents of an html text box

This statement will include the names of files or sections of code within a file for which he or she has been solely responsible, and the Web address of files that are visible on the group Web server space. A response such as ‘It was basically a j..

  Program to read employee information into array of objects

Consider a program that will read employee information into an array of objects, sort the array by employee identification number, write out the sorted array.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd