Page 289 - DCAP103_Principle of operating system
P. 289

Principles of Operating Systems



                   Notes         8.7 Keywords

                                 Access Control Mechanisms: The manner by which the operating system enforces the access
                                 control policy.
                                 Access  Control Policies:  Access  control  policy  defined  “whose  data  is  to  be  protected  from
                                 whom”.
                                 DoD Policy: This publication, DoD 5200.28-STD, “Department of Defense Trusted Computer
                                 System  Evaluation  Criteria,”  is  issued  under  the  authority  of  an  in  accordance  with  DoD
                                 Directive 5200.28, “Security Requirements for Automatic Data Processing (ADP) Systems,” and
                                 in furtherance of responsibilities assigned by DoD Directive 52l5.
                                 Workflow Management Coalition (WFMC): Work Flow Management is a fast evolving technology
                                 which is increasingly being exploited by businesses in a variety of industries.
                                 System Protection: A model of protection mechanisms in computing systems is presented and
                                 its appropriateness is argued. The “safety” problem for protection systems under this model is
                                 to determine in a given situation whether a subject can acquire a particular right to an object.
                                 In restricted cases, it can be shown that this problem is decidable, i.e. there is an algorithm
                                 to  determine  whether  a  system  in  a  particular  configuration  is  safe.  In  general,  and  under
                                 surprisingly weak assumptions, it cannot be decided if a situation is safe. Various implications
                                 of this fact are discussed.


                                                1.  C program for file permissions.

                                                2.  Give the steps for protection of the operating system.
                                 8.8 Review Questions


                                    1.  The access-control matrix could be used to determine whether a process can switch from,
                                      say, domain A to domain B and enjoy the access privileges of domain B. Is this approach
                                      equivalent to including the access privileges of domain B in those of domain A?

                                    2.  Consider a system in which “computer games” can be played by students only between
                                      10 p.m. and 6 a.m., by faculty members between 5 p.m. and 8 a.m., and by the computer
                                      center staff at all times. Suggest a scheme for implementing this policy efficiently.
                                    3.  What hardware features are needed for efficient capability manipulation? Can these be
                                      used for memory protection?
                                    4.  Discuss the strengths and weaknesses of implementing an access matrix using access lists
                                      that are associated with the objects.
                                    5.  Discuss the strengths and weaknesses of implementing an access matrix using capabilities
                                      that are associated with the domains.
                                    6.  Explain why a capability-based system such as Hydra provides greater flexibility than the
                                      ring protection scheme in enforcing protection policies.
                                    7.  What is the need-to-know principle? Why is it important for a protection system to adhere
                                      to this principle?
                                    8.  How are the access-matrix facility and the role-based access-control facility similar? How
                                      do they differ?





        282                               LOVELY PROFESSIONAL UNIVERSITY
   284   285   286   287   288   289   290   291   292   293   294