Page 272 - DCAP103_Principle of operating system
P. 272

Deepak Mehta, Lovely Professional University                                    Unit 8: System Protection



                                  Unit 8: System Protection                                       Notes




             CONTENTS

             Objectives
             Introduction

              8.1  Goals of Protection
                  8.1.1  Computer Architecture to Support OS Protection

              8.2  Access Matrix

                 8.2.1  Implementation of Access Matrix

                 8.2.2  Access Proxies

                 8.2.3  Stack Check/Modified Name Space

              8.3  Access Control

                  8.3.1  Concepts
                 8.3.2  Policies, Models and Mechanisms

                 8.3.3  Discretionary Access Control (DAC)

                 8.3.4  Non-Discretionary Access Control

                 8.3.5  Mandatory Access Control (MAC)

                 8.3.6  Role-based Access Control
                 8.3.7  Temporal Constraints

                 8.3.8  Workflow

                 8.3.9  Chinese Wall

              8.4  Revocation of Access Rights

              8.5  Capability Based System

                  8.5.1  Basic Notions

               8.6  Summary
               8.7  Keywords

              8.8  Review Questions

              8.9  Further Readings






                                             LOVELY PROFESSIONAL UNIVERSITY                                   265
   267   268   269   270   271   272   273   274   275   276   277