Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

I'm having issues how to even work this problem out. All the information that has been attached also has pics that are needed. I'm stuck

I'm having issues how to even work this problem out. All the information that has been attached also has pics that are needed. I'm stuck with not knowing any of this information

Problem 1.

Access Control Assumption: Privileges: read ("R"), write ("W"), execute ("X") Resources: - Document files: syllabus.doc, ch1.ppt - Image files: trees.jpg, jkim.png, csci563.gif - Binary files: prog1.exe, chrome.exe, wireshark.exe Access permissions (for users A, B, and C): - A has privilege to read all image files. - C has privilege to read and write all document files. - A and B have privilege to read "syllabus.doc" - A and C have privilege to read and execute "prog1.exe", "chrome.exe". - B and C have privilege to read csci563.gif. a. Construct the corresponding access control matrix.

To answer, use the format in Table 1.1 in the textbook. b. Construct the corresponding access control list.

To answer, use the format in Figure 1.5 in the textbook. c. Construct the corresponding capabilities list. To answer, use the format in Figure 1.6 in the textbook.

Problem 2. Vernam Cipher

Suppose the following table for encoding and decoding.

Letter

A

E

Y

M

O

R

H

L

Binary

000

001

010

011

100

101

110

111

Assume a message M is 'MORAL' and the key is 'HELLO'. What is the ciphertext C? Show your work.

Now assume a ciphertext C is 'HYMYR' and the key is 'HELLO'. What is the plaintext P? Show your work.image text in transcribedimage text in transcribed

Figure 5: The access control lists (ACLs) corresponding to the access control matrix of Table 1 . We use the shorthand notation of r=read, w= write, and x= execute. Figure 6: The capabilities corresponding to the access control matrix of Table 1 . We use the shorthand notation of r=read,w= write, and x= execute. Here are the table and figures mentioned in Assignment 1. Table 1: An example access control matrix. This table lists read, write, and execution (exec) access rights for each of four fictional users with respect to one file, letc/passwd, and three directories

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The Database Experts Guide To Database 2

Authors: Bruce L. Larson

1st Edition

0070232679, 978-0070232679

More Books

Students also viewed these Databases questions

Question

tools and techniques for process modeling

Answered: 1 week ago

Question

What is the cerebrum?

Answered: 1 week ago

Question

Create a workflow analysis.

Answered: 1 week ago