Outline for 3/2/98

  • Last time: Disk scheduling, layout, RAID
  • Administrative:
  • Objective: Protection, Control of access to files.

    Protection Overview

    Authentication

    Representation of Authorization
    Access Control Model

    Two Representations

    Dynamics of Protection Schemes

    Protection Domains

    Trojan Horse

    Enforcement Mechanisms