Computer Science

In the text, we argued that it’s easy to delegate using capabilities.

a. It is also possible to delegate using ACLs. Explain how this would work.

b. Suppose Alice delegates to Bill who then delegates to Charlie who, in turn, delegates to Dave. How would this be accomplished using capabilities? How would this be accomplished using ACLs? Which is easier and why?

c. Which is better for delegation, ACLs or capabilities? Why?

Suppose that you work in a classified environment where MLS is employed and you have a TOP SECRET clearance.

a. Describe a potential covert channel involving the User Datagram

Protocol (UDP).

b. How could you minimize your covert channel in part a, while still allowing network access and communication by users with different clearances?

The high water mark principle and low water mark principle both apply in the realm of multilevel security.

a. Define the high water mark principle and the low water mark principle in the context of MLS.

b. Is BLP consistent with a high water mark principle, a low water mark principle, both, or neither? Justify your answer.

c. Is Biba’s Model consistent with a high water mark principle, a low water mark principle, both, or neither? Justify your answer.

Solution:

Looking for help with your homework?
Grab a 30% Discount and Get your paper done!

30% OFF
Turnitin Report
Formatting
Title Page
Citation
Place an Order

Grab A 14% Discount on This Paper
Pages (550 words)
Approximate price: -