0% found this document useful (0 votes)
62 views1 page

Information Security and Privacy: Homework 2 Total Points: 50

This document outlines the assignments for a homework on information security and privacy. It includes 3 questions worth a total of 50 points: exercise 4 from chapter 2.8 worth 20 points, exercise 2 from section 3.10 worth 5 points, and analyzing the transitions of a Turing machine and mapping it to an access control matrix worth 25 points.

Uploaded by

Wu Yuqiao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views1 page

Information Security and Privacy: Homework 2 Total Points: 50

This document outlines the assignments for a homework on information security and privacy. It includes 3 questions worth a total of 50 points: exercise 4 from chapter 2.8 worth 20 points, exercise 2 from section 3.10 worth 5 points, and analyzing the transitions of a Turing machine and mapping it to an access control matrix worth 25 points.

Uploaded by

Wu Yuqiao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Information Security and Privacy

Homework 2
Total Points: 50

1. [20 Points] Do exercise 4 from Chapter 2.8

2. [5 Points] Do exercise 2 from section 3.10

3. [25 Points] Consider a Turing Machine with the following specification

1. Set of states: {k0, k1, k2, k3}


2. Tape symbols: {A, B, C}
3. Final (or halting) state is k3
4. Transition Functions:
δ( k0, A) = (k2, C, R)
δ( k1, C)= (k2, B, R)
δ( k1, A)= (k3, C, L)
δ( k2, A) = (k1, C, L)
δ( k2, C) = (k1, B, R)

Assume your TM’s initial configuration is as shown below.


1. Show the mapping of the elements of this TM to a protection system (ACM).
2. Show all possible transitions, indicating each new TM configuration reached (i.e., state,
head position and the symbols in each cell) and its corresponding protection state (the
entries in the Access Control Matrix).

You might also like