diff -r f91255f99205 -r e9288308dbcf hw03.tex --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/hw03.tex Tue Oct 09 20:26:54 2012 +0100 @@ -0,0 +1,32 @@ +\documentclass{article} +\usepackage{charter} +\usepackage{hyperref} + +\begin{document} + +\section*{Homework 2} + +\begin{enumerate} +\item What does the principle of least privilege say? + +\item In which situations can the access control mechanism of Unix +file permissions be used? + +\begin{itemize} +\item[(a)] Alice wants to have her files readable, except for her office mates. +\item[(b)] Bob and Sam want to share some secret files. +\item[(c)] Root wants some of her files to be public. +\end{itemize} + +\item What should be the architecture of a network application under Unix +be that processes potentially hostile data? + +\item What does the Bell --- La Pudela model ensure? Similarly, what does the Biba model ensure? +\end{enumerate} + +\end{document} + +%%% Local Variables: +%%% mode: latex +%%% TeX-master: t +%%% End: