hw03.tex
changeset 33 e9288308dbcf
child 34 24116ce8c294
equal deleted inserted replaced
32:f91255f99205 33:e9288308dbcf
       
     1 \documentclass{article}
       
     2 \usepackage{charter}
       
     3 \usepackage{hyperref}
       
     4 
       
     5 \begin{document}
       
     6 
       
     7 \section*{Homework 2}
       
     8 
       
     9 \begin{enumerate}
       
    10 \item What does the principle of least privilege say?
       
    11 
       
    12 \item In which situations can the access control mechanism of Unix
       
    13 file permissions be used?
       
    14 
       
    15 \begin{itemize}
       
    16 \item[(a)] Alice wants to have her files readable, except for her office mates.
       
    17 \item[(b)] Bob and Sam want to share some secret files.
       
    18 \item[(c)] Root wants some of her files to be public.
       
    19 \end{itemize}
       
    20 
       
    21 \item What should be the architecture of a network application under Unix 
       
    22 be that processes potentially hostile data?
       
    23 
       
    24 \item What does the Bell --- La Pudela model ensure? Similarly, what does the Biba model ensure?
       
    25 \end{enumerate}
       
    26 
       
    27 \end{document}
       
    28 
       
    29 %%% Local Variables: 
       
    30 %%% mode: latex
       
    31 %%% TeX-master: t
       
    32 %%% End: