Answered step by step
Verified Expert Solution
Question
1 Approved Answer
The goal of this assignment is to create a simulated environment that mimics access control principles so that the student will have better understanding of
The goal of this assignment is to create a simulated environment that mimics access control principles so that the student will have better understanding of the access control lists System Description Your system will have a centralized server and a set of clients (exactly 5 clients). The server will be the core component in the system. The server will take care of making sure - that no violation of the CIA will take place by enforcing the system policies. 1. One of the clients (Client 1) should represent a parent system. In this case, this client (client 1) has the power over the system. This means that any request that comes from client 1 should have the highest privilege and hence should be enforced regardless of any policy that might be violated. 2. Other clients (client 2, client 3, client 4, and client 5) are just normal users that should be governed by the system for any violation of CIA. 3. Hence, any request should specify the client number as its first parameter. If it i:s client 1 then this has the highest privilege. Other clients should be governed by system policies. (Client#, Req.) An access control matrix should be created in the server side Any client can create any number of files Basic access rights should be supported (read, write, execute, delete, control, etc.) - Upon creation of a new file, the following rules should be enforced The goal of this assignment is to create a simulated environment that mimics access control principles so that the student will have better understanding of the access control lists System Description Your system will have a centralized server and a set of clients (exactly 5 clients). The server will be the core component in the system. The server will take care of making sure - that no violation of the CIA will take place by enforcing the system policies. 1. One of the clients (Client 1) should represent a parent system. In this case, this client (client 1) has the power over the system. This means that any request that comes from client 1 should have the highest privilege and hence should be enforced regardless of any policy that might be violated. 2. Other clients (client 2, client 3, client 4, and client 5) are just normal users that should be governed by the system for any violation of CIA. 3. Hence, any request should specify the client number as its first parameter. If it i:s client 1 then this has the highest privilege. Other clients should be governed by system policies. (Client#, Req.) An access control matrix should be created in the server side Any client can create any number of files Basic access rights should be supported (read, write, execute, delete, control, etc.) - Upon creation of a new file, the following rules should be enforced
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started