Outline for March 10, 2006
Reading: text, §15.1–15.3
- Greetings and felicitations!
- Puzzle of the day
- Access Control Lists
- UNIX method
- ACLs: describe, revocation issue
- Capabilities
- Capability-based addressing: show picture of
accessing object
- Show process limiting access by not inheriting all
parent's capabilities
- Revocation: use of a global descriptor table
- Privilege in Languages
- Nesting program units
- Temporary upgrading of privileges
- Lock and Key
- Associate with each object a lock; associate with
each process that has access to object a key (it’s a cross
between ACLs and C-Lists)
- Example: use crypto (Gifford). X object enciphered
with key K. Associate an opener
R with X. Then:
OR-Access: K
can be recovered with any Di in a list of
n deciphering transformations, so
R = (E1(K),
E2(K), ...,
En(K)) and any
process with access to any of the
Di’s can access the
file
AND-Access: need all n deciphering
functions to get K:
R = E1(E2(...En(K...))
- Types and locks
Version of March 13, 2006 at 8:53 AM
You can also obtain a PDF version of this.