Question

(4 pts) Say that a system has 10 users, each of which has 200 files in...

(4 pts) Say that a system has 10 users, each of which has 200 files in their home directory. Each user should have read and write access to every file in their own home directory.

If this policy were expressed as a DAC matrix, how many nonempty entries would the matrix need to have?

Express this policy as a single if-then rule, such as might be used in an Attribute-based Access Control (ABAC) system.

PLEASE GIVE ONE WORD OR ONE LINE ANSWERS AND DO NOT TYPE ESSAYS. THANK YOU

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Lets consider a 2D Matrix where columns represents the users and rows denote the Files that each user have access to:-

Here R/W means that the user has Read/Write access to a particular File in his home directory

USER1 USER2 USER3 USER4 USER5 USER6 USER7 USER8 USER9 USER10
FILE1 R/W R/W R/W ... .... .... ... .... ...
FILE2 R/W R/W
FILE3 R/W R/W
...
FILE200 R/W R/W

How many nonempty entries would the matrix need to have?
The number of non-empty entries will be determined whether a particular user has Read/Write access for that particular file.

Express this policy as a single if-then rule, such as might be used in an Attribute-based Access Control (ABAC) system.

if (USER_ACCESS [0][0] == 'R/W') then .....

else if (USER_ACCESS[0][0] == ' ') then ....

Please let me know in case of any clarifications required. Thanks!

Add a comment
Know the answer?
Add Answer to:
(4 pts) Say that a system has 10 users, each of which has 200 files in...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Consider a file server where a user is allowed to download files. Each file has an...

    Consider a file server where a user is allowed to download files. Each file has an access control list of the users that are allowed to download the file. The security policy is that only users listed in the access control list can download the file. List the information that must be logged by a system that audits this policy.

  • Question 2 4 pts 2. Bob and Alice are typical users who share a computer. Which...

    Question 2 4 pts 2. Bob and Alice are typical users who share a computer. Which of the following are true of a file sharing policy? Assume no tailoring takes place. Select all that apply. Bob and Alice can read files that others can't read. Bob can modify Alice's files. Bob can read Alice's files. Bob can create, read, and modify his own files. Alice can read and write application files. Bob and Alice can share files (read and write)...

  • Objective : Write a C Shell script which copies all files(*.java and *.class) from your home dire...

    Objective : Write a C Shell script which copies all files(*.java and *.class) from your home directory to a new one, and Analyze the new directory information such as number of files, user permissions, and disk usage. Sample Output:                                                    << CS Directory Analysis >>      Date:   ============================================================ Current Directory: /home/tomss New Directory Created : /home/tomss/pgm01 File information Total Number of files : 22 files Directory files:   0 files Plain text files:   10 files File have read permissions: 3 files File have...

  • UNIX File Permission help, please answer the questions in the green boxes. Thank you Lab 03...

    UNIX File Permission help, please answer the questions in the green boxes. Thank you Lab 03 File Permissions In this lab we will: learn about file permissions learn to create symbolic links and hard links Utilities that will be utilized in this Lab: us, cd, less, cat touch, chmod id umask, mkdir, In, echo and redirection Users and Groups Linux supports several methods of controlling access to files an directories. In this lab we are going to learn the traditional...

  • Consider a system where a data files (F_i, and i denotes the file ID) is distributed...

    Consider a system where a data files (F_i, and i denotes the file ID) is distributed over a cloud. A data file is generated by an author (AU_k, and k, denotes the author ID) and stored on a distribution server (DS). Only authorized users (US_1, and denotes the user ID) previously registered on the system using their private keys (KPR_1) are allowed to download the data. Users' public certificates (KPU_1) and revocation lists (CRL) are available on a trusted Certificate...

  • Using Kali Linux, the Windows Linux Sub-System, or another Debian based Linux distribution, perform the following...

    Using Kali Linux, the Windows Linux Sub-System, or another Debian based Linux distribution, perform the following tasks based on the Linux Fundamentals lecture. For this lab, take screenshots for all major steps completed to illustrate that each task was successfully completed the same method as would be used for other labs). Tasks: 1. Create a new user named Billy Bob using the command linter face 2. Add Billy Bob to the sudoers group 3. Update and upgrade your Linux distribution...

  • Create a folder named "TrainerApp". In that folder create the following files. Create a PHP file,...

    Create a folder named "TrainerApp". In that folder create the following files. Create a PHP file, "insert-user-form.php", with a form that has the following fields: - First Name (text) - Last Name (text) - Email (text) - Password (text) - Submit button Create another PHP file, "insert-exercise-form.php" with a form that has the following fields: - Exercise Name (text) - Description (text) - Demonstration Image (file) - Submit button Create another PHP file, "login-user-form.php" with a form that has the...

  • 36. What kind of virus runs in place of the computer's normal system files? A. Worms...

    36. What kind of virus runs in place of the computer's normal system files? A. Worms B. Macro viruses C. File-infector viruses D. Boot sector viruses 37. What of the following features does not distinguish an NGFW from traditional firewalls? A. Application Control B. IDS and/or IPS C. User awareness D. UTM (Unified Threat Management) 38. The act of taking advantage of vulnerability is known as which of the following? a. hacker b. poisoning c. snooping d. exploit 39. What...

  • Pythong Program 4 should first tell users that this is a word analysis software. For any...

    Pythong Program 4 should first tell users that this is a word analysis software. For any user-given text file, the program will read, analyze, and write each word with the line numbers where the word is found in an output file. A word may appear in multiple lines. A word shows more than once at a line, the line number will be only recorded one time. Ask a user to enter the name of a text file. Using try/except for...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT