《操作系统概念》

作者:【美】西尔伯查茨 等  出版社:高等教育出版社

题目 题型
Consider the ring protection scheme in MULTICS.If we were to implement the system calls of a typical operating system and stor 问答
The access-control matrix could be used to determine whethera process can switch from,say,domain A to domain B and enjoy the a 问答
Consider a system in which "computer games" can be played by students only between 10 P.M.and 6 A.M,by faculty membe 问答
What hardware features are needed for efficient capability manipulation? Can these be used for memory protection? 问答
Discuss thestrengths and weaknesses of implementing an access matrix using access lists that are associated with objects. 问答
Discuss the strengths and weaknesses of implementing an access matrix using capabilities that are associated with domains. 问答
Explain why a capability-based system such as Hydra provides greater flexibility than the ring protection scheme in enforcing 问答
Discuss the need for rights amplification in Hydra.How does this practice compare with the cross-ring calls in a ring protecti 问答
What is the need to-know principle? Why is it important for a protection system to adhere to this principle ? 问答
Discuss which of the follow ing systems allow module designers to enforce the need-to-know principle. 单选
Describe how the Java protection model would be sacrificed if a Java program were allowed to directly alter the annotations of 问答
How are the access-matrix facility and the role-based access-control facility similar? How do they differ? 问答
How does the principle of least privilege aid in the creation of protection systems ? 问答
How can systems that implement the principle of least privilege still have protection failures that lead to security violation 问答