Lecture Protection and Security Unit 6
Lecture Protection and Security Unit 6
Goals of Protection
Mechanism (Method)
Operating system provides access-matrix + rules
If ensures that the matrix is only manipulated by
authorized agents and that rules are strictly enforced
Policy (Rules)
User dictates policy
Who can access what object and in what mode
Implementation of Access Matrix
There are 2 methods:
1. Access Control Lists
ACL can be created by dividing Access Matrix Column
Wise.
Separate list is maintained for each domain and each object.
It skips blank row entries in each domain.
2. Capability List
Can be created by dividing Access Matrix Row Wise.
It is list of access rights that a user / domain or a process has
for a object.
It is divided into 2 fields:
Object Descriptor
Access Rights
Access Matrix With Domains as Objects
Figure B
Operation on Access Matrix Entries
1. Copy
It allows the access right to be copied only within the column
(for an object)
Ability to copy an access right from one domain (row) to another is
denoted by asterisk ( * )
A process executing in domain D2 can copy read operation into
any entry associated with file F2
The ability to copy rights is denoted by an asterisk, indicating
that processes in that domain have the right to copy that
access within the same column
Access Matrix with Copy Rights
For example, in Figure
(a), a process executing in
domain D2 can copy the
read operation into any
entry associated with file
F2.
1. GLOBAL TABLE:
Global Table consisting of a ordered set of triples<domain, object,
right set>
Before every operation on any object in any domain, global table is
searched for triple.
If triple is found, operation is allowed to continue, otherwise an
exception or error condition is raised.
Drawbacks:
Table is large. Cant be kept in main memory. So additional I/O is
needed.
1. Trojan horse
A Trojan horse, or Trojan, is software that
appears to perform a desirable function for the
user, but steals information or harms the
system.
Include a Password