hw03.tex
author Christian Urban <urbanc@in.tum.de>
Tue, 09 Oct 2012 20:26:54 +0100
changeset 33 e9288308dbcf
child 34 24116ce8c294
permissions -rw-r--r--
tuned

\documentclass{article}
\usepackage{charter}
\usepackage{hyperref}

\begin{document}

\section*{Homework 2}

\begin{enumerate}
\item What does the principle of least privilege say?

\item In which situations can the access control mechanism of Unix
file permissions be used?

\begin{itemize}
\item[(a)] Alice wants to have her files readable, except for her office mates.
\item[(b)] Bob and Sam want to share some secret files.
\item[(c)] Root wants some of her files to be public.
\end{itemize}

\item What should be the architecture of a network application under Unix 
be that processes potentially hostile data?

\item What does the Bell --- La Pudela model ensure? Similarly, what does the Biba model ensure?
\end{enumerate}

\end{document}

%%% Local Variables: 
%%% mode: latex
%%% TeX-master: t
%%% End: