Levels Tought:
Elementary,Middle School,High School,College,University,PHD
Teaching Since: | Apr 2017 |
Last Sign in: | 9 Weeks Ago, 3 Days Ago |
Questions Answered: | 4870 |
Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Hi i need help to finish this access control matrix in UNIX-style.
Â
Â
Consider the relationship between access control matrices and UNIX-style file
permissions. Consider a UNIX system with only four users: Alice, Chuck, Bob,
and Dave. Assume that there is no root principle. These users are assigned
to groups as shown in the table below:
Group Members Alice Alice Bob Bob Chuck Chuck Dave Dave g Alice, Chuck h Bob, Chuck, Dave One possible access control policy for two files File1 and File2 is given by the
UNIX permissions shown in the table below, where r = read, w = write and
x = execute
Own
er Grou
p User
permission(s) Group
permission(s) Other
permissio
n File1 Bob g r r, w x File2 Alice Bob r, x w x Complete the access control matrix below that corresponds to the UNIX
permissions above. The permission set in each entry of the matrix is a subset
of {r, w, x}
Alice
File 1 File2 Bob Chuck Dave
-----------