Explain a scheme of capability list to implement protection, Computer Engineering

Assignment Help:

Describe the scheme of capability lists to implement protection?

Capability lists (C- lists):

These lists are utilized to make sure that uses only access files that are explicitly authorized access. These files contain

(i) files created by a user herself/himself

(ii) files owned by others, for that a user process explicit access privileged granted through other owners.

C-list: A capability is a file access privilege relating capabilities possessed through a user is stored in a capability list. A C-list is a set of pairs{ (file.id, access privileges),.....}

C-lists are generally small in size. It limits the space and time over heads in utilizing them to control file accesses. A c-list is a token representing specific access privileges for an object. An object is any software or hardware entity in the system. A capability possessed through a process. A process possessing, it is a capability for an object can access the object in a way reliable with the access privileges explained in the capability. Therefore maintaining C-lists give:

1. A uniform addressing mechanism for short and long life objects

2. This does not explicitly associate memory along with processes. This associates C-lists along with processes.

3. A process may access objects existing anywhere into the system.


Related Discussions:- Explain a scheme of capability list to implement protection

Strategy used for the project design, This project is divided to two parts ...

This project is divided to two parts (hardware and software) each with is subtask and consideration was given in all areas in order to meet the target specification. Solutions are

Draw layout cells in a table, Now add layout cells into which you will add ...

Now add layout cells into which you will add text about travel locations. 1.  In Objects panel, click the Draw Layout Cell icon and move the pointer to layout table you just dre

Prolog programming language, Prolog Programming Language : Probably pr...

Prolog Programming Language : Probably programming languages are procedural: than the programmer specifies exactly the right instructions (algorithms) required to get an agent

Difference between absolute and relative path, What is the difference betwe...

What is the difference between absolute and relative path name of a file? Absolute path name: This is listing of the directories and files from the root directory to the i

Layered architecture of edi, Layered Architecture of EDI: EDI is most c...

Layered Architecture of EDI: EDI is most commonly applied in the implementation and settlement phases of the trade cycle. In implementation of a simple trade exchange, the cust

Interface constructors, Describe a interface 'Human' with methods as walk' ...

Describe a interface 'Human' with methods as walk' and 'speak'. Describe a class 'User' implementing 'Human'. Describe a work() method in User class.Add a class 'Person' also execu

What is electronic data interchange, What is Electronic Data Interchange? ...

What is Electronic Data Interchange? Electronic Data Interchange (EDI): It is used by organizations for transactions which arise on regular basis to a pre-found format.

Define syntax of barrier directive, Q. Define syntax of barrier directive? ...

Q. Define syntax of barrier directive? Barrier Directive  The syntax of barrier directive is  #pragma omp barrier When a thread attains barrier it waits till all threa

How a procedure define in assembly, Q. How a Procedure define in Assembly ?...

Q. How a Procedure define in Assembly ? Procedure is defined within source code by placing a directive of form: PROC A procedure is terminated using: ENDP The

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd