diff -r e1e314c1bb61 -r efcac3016613 hw03.tex --- a/hw03.tex Mon Sep 23 17:02:24 2013 +0100 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,38 +0,0 @@ -\documentclass{article} -\usepackage{charter} -\usepackage{hyperref} - -\begin{document} - -\section*{Homework 3} - -\begin{enumerate} -\item What does the principle of least privilege say? - -\item In which of the following situations can the access control mechanism of Unix -file permissions be used? - -\begin{itemize} -\item[(a)] Alice wants to have her files readable, except for her office mates. -\item[(b)] Bob and Sam want to share some secret files. -\item[(c)] Root wants some of her files to be public. -\end{itemize} - -\item What should the architecture of a network application under Unix -be that processes potentially hostile data? - -\item How can you exploit the fact that every night root has a cron -job that deletes the files in \texttt{/tmp}? - -\item What does it mean that the program \texttt{passwd} has the \texttt{setuid} -bit set? Why is this necessary? - -\item What does the Bell --- La Padula model ensure? Similarly, what does the Biba model ensure? -\end{enumerate} - -\end{document} - -%%% Local Variables: -%%% mode: latex -%%% TeX-master: t -%%% End: