4. For the DAC model discussed in the textbook, an alternative representation of the protection state is a directed graph. Each subject and each object in the protection state is represented by a node (a single node is used for an entity that is both subject and object). A directed line from a subject to an object indicates an access right, and the label on the link defines the access right a. Draw a directed graph that corresponds to the access matrix of Figure 4.2a on page 119 b. Draw a directed graph that nds to the access matrix given below 0 o.r.w r,W o,e r,W Pi P2 here o=owner. r.w r.w r.w r=read, w=write, e=execute c. for the above table give the access control lists for files Fl and F2 and the capability lists for users S1, S2, S3 and processes P1, P2 d. In general, is there a one-to-one correspondence between the directed graph representation and the access matrix representation? Explain. e. given the directed graph below provide the corresponding access control matrix Sz 4. For the DAC model discussed in the textbook, an alternative representation of the protection state is a directed graph. Each subject and each object in the protection state is represented by a node (a single node is used for an entity that is both subject and object). A directed line from a subject to an object indicates an access right, and the label on the link defines the access right a. Draw a directed graph that corresponds to the access matrix of Figure 4.2a on page 119 b. Draw a directed graph that nds to the access matrix given below 0 o.r.w r,W o,e r,W Pi P2 here o=owner. r.w r.w r.w r=read, w=write, e=execute c. for the above table give the access control lists for files Fl and F2 and the capability lists for users S1, S2, S3 and processes P1, P2 d. In general, is there a one-to-one correspondence between the directed graph representation and the access matrix representation? Explain. e. given the directed graph below provide the corresponding access control matrix Sz