C SC 340 Lecture 11: Protection

[ previous | schedule | next ]

Distinguishing Protection from Security

Protection

Protection provides the mechanism for enforcing security policies.

System resources need protection

Protection Domain

Access Matrix

Example: visualizing access matrix for Unix system
-rwxr-xr-x    1  sandy    students    14839   May 14  07:15  chatter
-rw-r-----    1  sandy    students      998   May 14  08:27  guru.c
drwxr-xr--    2  sandy    students     4096   May 17  11:59  data
        object →
domain
chatter
guru.c
data
owner
read, write, executeread, writeread, write, traverse
group
read, executereadread, traverse
world
read, execute read

Access matrix implementation alternatives

If capability list is used, do not allow the list to be placed in the process address space, where it can be modified.

Global table is not feasible due to size. Most systems use combination of access lists and capability lists.

Unix Example of combined access/capability:

Protection provided by compilers and languages


[ C SC 340 | Peter Sanderson | Math Sciences server  | Math Sciences home page | Otterbein ]

Last updated:
Peter Sanderson (PSanderson@otterbein.edu)