Operating System Exercises - Chapter 14-Sol
Operating System Exercises - Chapter 14-Sol
CHAPTER
Protection
Practice Exercises
14.1 What are the main differences between capability lists and access lists?
Answer: An access list is a list for each object consisting of the domains
with a nonempty set of access rights for that object. A capability list is
a list of objects and the operations allowed on those objects for each
domain.
14.2 A Burroughs B7000/B6000 MCP file can be tagged as sensitive data.
When such a file is deleted, its storage area is overwritten by some
random bits. For what purpose would such a scheme be useful?
Answer: This would be useful as an extra security measure so that the
old content of memory cannot be accessed, either intentionally or by
accident, by another program. This is especially useful for any highly
classified information.
14.3 In a ring-protection system, level 0 has the greatest access to objects,
and level n (greater than zero) has fewer access rights. The access rights
of a program at a particular level in the ring structure are considered as
a set of capabilities. What is the relationship between the capabilities
of a domain at level j and a domain at level i to an object (for j > i)?
Answer: D j is a subset of Di .
14.4 The RC 4000 system (and other systems) have defined a tree of processes
(called a process tree) such that all the descendants of a process are given
resources (objects) and access rights by their ancestors only. Thus, a
descendant can never have the ability to do anything that its ancestors
cannot do. The root of the tree is the operating system, which has the
ability to do anything. Assume the set of access rights was represented
by an access matrix, A. A(x,y) defines the access rights of process x to
55
56 Chapter 14 Protection