Protection

References:

  1. Abraham Silberschatz, Greg Gagne, and Peter Baer Galvin, "Operating System Concepts, Ninth Edition ", Chapter 14

14.1 Goals of Protection

14.2 Principles of Protection

14.3 Domain of Protection

14.3.1 Domain Structure


Figure 14.1 - System with three protection domains.

14.3.2 An Example: UNIX

14.3.3 An Example: MULTICS


Figure 14.2 - MULTICS ring structure.

14.4 Access Matrix


Figure 14.3 - Access matrix.


Figure 14.4 - Access matrix of Figure 14.3 with domains as objects.


Figure 14.5 - Access matrix with copy rights.


Figure 14.6 - Access matrix with owner rights.


Figure 14.7 - Modified access matrix of Figure 14.4

14.5 Implementation of Access Matrix

14.5.1 Global Table

14.5.2 Access Lists for Objects

14.5.3 Capability Lists for Domains

14.5.4 A Lock-Key Mechanism

14.5.5 Comparison

14.6 Access Control


Figure 14.8 - Role-based access control in Solaris 10.

14.7 Revocation of Access Rights

14.8 Capability-Based Systems ( Optional )

14.8.1 An Example: Hydra

14.8.2 An Example: Cambridge CAP System

14.9 Language-Based Protection ( Optional )

14.9.1 Compiler-Based Enforcement

14.9.2 Protection in Java


Figure 14.9 - Stack inspection.

14.10 Summary