--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/hw03.tex Tue Oct 09 20:26:54 2012 +0100
@@ -0,0 +1,32 @@
+\documentclass{article}
+\usepackage{charter}
+\usepackage{hyperref}
+
+\begin{document}
+
+\section*{Homework 2}
+
+\begin{enumerate}
+\item What does the principle of least privilege say?
+
+\item In which situations can the access control mechanism of Unix
+file permissions be used?
+
+\begin{itemize}
+\item[(a)] Alice wants to have her files readable, except for her office mates.
+\item[(b)] Bob and Sam want to share some secret files.
+\item[(c)] Root wants some of her files to be public.
+\end{itemize}
+
+\item What should be the architecture of a network application under Unix
+be that processes potentially hostile data?
+
+\item What does the Bell --- La Pudela model ensure? Similarly, what does the Biba model ensure?
+\end{enumerate}
+
+\end{document}
+
+%%% Local Variables:
+%%% mode: latex
+%%% TeX-master: t
+%%% End: