[CSE]  Advanced Operating Systems 
 COMP9242 2002/S2 
UNSW

PRINTER Printer-Friendly Version
Administration               
- Notices
- Course Intro
- Consultations
# On-line Survey (closed)
- Survey Results
 
Work
- Lectures
- Milestone 0
- Project Admin
- Project Spec
- Project FAQ
- Exam
 
Documentation
- ASysT Lab
- L4 source browser
- Sulima ISA Simulator
R4x00 ISA Summary 
MIPS R4700 ReferenceMIPS R4000 User Manual 
- Network Driver
- GT64111
 
Related Info
- Aurema OS Prize
- OS Hall of Fame
 
History
- 2000
- 1999
- 1998
 
Staff
- Gernot Heiser (LiC)

 
Valid HTML 4.0!
next up previous
Next: Access matrix implementation: ACLs Up: 03-caps Previous: Access matrix properties

Issues for Protection System Design


  • Propagation of rights:
    • Can agent grant access to another?
  • Restriction of rights:
    • Can agent propagate restricted rights?
  • Revocation of rights:
    • Can access, once granted, be revoked?
  • Amplification of rights:
    • Can unprivileged agent perform restricted operations?
  • Determination of object accessibility:
    • Which agents have access?
    • Is object accessible at all (garbage collection)?
  • Determination of agent's protection domain:
    • Which objects are accessible?



Gernot Heiser 2002-08-15