Log In
0 votes
In some systems, a subdirectory can be read and written by an
authorized user, just as ordinary files can be.
a. Describe the protection problems that could arise.
b. Suggest a scheme for dealing with each of these protection
in Operating System 29 views

Please log in or register to answer this question.

Related questions

0 votes
0 answers
Researchers have suggested that, instead of having an access list associated with each file (specifying which users can access the file, and how), we should have a user control list associated with each user (specifying which files a user can access, and how). Discuss the relative merits of these two schemes.
asked Mar 22, 2019 in Operating System ajaysoni1924 30 views
0 votes
0 answers
Consider a system that supports 5,000 users. Suppose that you want to allow 4,990 of these users to be able to access one file. a. How would you specify this protection scheme in UNIX? b. Can you suggest another protection scheme that can be used more effectively for this purpose than the scheme provided by UNIX?
asked Mar 22, 2019 in Operating System ajaysoni1924 58 views
0 votes
0 answers
0 votes
0 answers
Could you simulate a multilevel directory structure with a single-level directory structure in which arbitrarily long names can be used? If your answer is yes, explain how you can do so, and contrast this scheme with the multilevel directory scheme. If your answer is no, explain what prevents your simulation’s success. How would your answer change if file names were limited to seven characters?
asked Mar 22, 2019 in Operating System ajaysoni1924 35 views