, , , , ,

[SOLVED] Cs 3423 operating systems assignment 13

$25

File Name: Cs_3423_operating_systems_assignment_13.zip
File Size: 367.38 KB

Rate this Assignment

1. [20 points] What are the main differences between capability lists and access lists?
2. [20 points] Consider a computing environment where a process is given the privilege
of accessing an object only n times. Suggest a scheme for implementing this policy.
3. [20 points] Capability lists are usually kept within the address space of the user.
How does the system ensure that the user cannot modify the contents of the list?
4. [20 points] 14.3 Consider a computer system in which computer games can be
played by students only between 10 P.M. and 6 A.M., by faculty members between 5
P.M. and 8 A.M., and by the computer center staff at all times. Suggest a scheme for
implementing this policy efficiently.
5. [20 points] 14.8 Discuss the need for rights amplification in Hydra. How does this
practice compare with the cross-ring calls in a ring-protection scheme?

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Shopping Cart
[SOLVED] Cs 3423 operating systems assignment 13
$25