CH 18
CH 18
Goals of Protection
Domain of Protection
Access Matrix
Implementation of Access Matrix
Revocation of Access Rights
Capability-Based Systems
Language-Based Protection
UNIX
Domain = user-id
Domain switch accomplished via file system.
Each file has associated with it a domain bit (setuid bit).
When file is executed and setuid = on, then user-id is
set to owner of the file being executed. When execution
completes user-id is reset.
Multics Rings
Operating System Concepts 18.5 Silberschatz, Galvin and Gagne 2002
Access Matrix
Figure A
Each Row = Capability List (like a key)
Fore each domain, what operations allowed on what objects.
Object 1 – Read
Object 4 – Read, Write, Execute
Object 5 – Read, Write, Delete, Copy
Figure B
Hydra
Fixed set of access rights known to and interpreted by the
system.
Interpretation of user-defined rights performed solely by
user's program; system provides access protection for use
of these rights.