equal
deleted
inserted
replaced
|
1 \documentclass{article} |
|
2 \usepackage{charter} |
|
3 \usepackage{hyperref} |
|
4 |
|
5 \begin{document} |
|
6 |
|
7 \section*{Homework 2} |
|
8 |
|
9 \begin{enumerate} |
|
10 \item What does the principle of least privilege say? |
|
11 |
|
12 \item In which situations can the access control mechanism of Unix |
|
13 file permissions be used? |
|
14 |
|
15 \begin{itemize} |
|
16 \item[(a)] Alice wants to have her files readable, except for her office mates. |
|
17 \item[(b)] Bob and Sam want to share some secret files. |
|
18 \item[(c)] Root wants some of her files to be public. |
|
19 \end{itemize} |
|
20 |
|
21 \item What should be the architecture of a network application under Unix |
|
22 be that processes potentially hostile data? |
|
23 |
|
24 \item What does the Bell --- La Pudela model ensure? Similarly, what does the Biba model ensure? |
|
25 \end{enumerate} |
|
26 |
|
27 \end{document} |
|
28 |
|
29 %%% Local Variables: |
|
30 %%% mode: latex |
|
31 %%% TeX-master: t |
|
32 %%% End: |