subject

Consider the following scenario. An organization employs product managers, programmers and testers. The organization operates with the following kinds of files: development code and executables, testing code and executables, test reports, and production code and executables. Product Managers can view, and execute the development executables and production executables to verify correctness. Programmers can create, edit, delete, and execute development code and executables. Programmers can also promote development code to the test level. Testers can edit, delete, and execute test code and executables. The testers write test reports that can be read by everyone. The testers can promote test code to production level or demote it back to development. Everyone can view and execute production code and executables. Eve is the product manager, Alice and Bob are programmers. Carol and Dave are testers a) Define the rights the access control system would need to enforce the requirements for this scenario. Associate the abbreviation you will use in part b and c with the definition.
b) Design an access control matrix for the scenario for the users.
c) Assume the Access Matrix is being implemented by a system using Access Control Lists. Write the Access Control List for the Development Executables.
d) Assume the Access Matrix is being implemented by a Capability system. Write the Capability list for Alice.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 21:50
Answer the following questions regarding your system by using the commands listed in this chapter. for each question, write the command you used to obtain the answer. a. what are the total number of inodes in the root filesystem? how many are currently utilized? how many are available for use? b. what filesystems are currently mounted on your system? c. what filesystems are available to be mounted on your system? d. what filesystems will be automatically mounted at boot time?
Answers: 1
question
Computers and Technology, 22.06.2019 23:00
Which factor is the most important when choosing a website host? whether customers will make secure transactions the number of email accounts provided the purpose of the website the quality of the host control panel
Answers: 3
question
Computers and Technology, 23.06.2019 03:30
Hashtags serve to identify the topic of a given tweet true false
Answers: 2
question
Computers and Technology, 23.06.2019 09:50
Allison and her group have completed the data entry for their spreadsheet project. they are in the process of formatting the data to make it easier to read and understand. the title is located in cell a5. the group has decided to merge cells a3: a7 to attempt to center the title over the data. after the merge, allison points out that it is not centered and looks bad. where would the title appear if allison unmerged the cells in an attempt to fix the title problem?
Answers: 2
You know the right answer?
Consider the following scenario. An organization employs product managers, programmers and testers....
Questions
question
Mathematics, 08.12.2020 14:00
question
Chemistry, 08.12.2020 14:00
question
Social Studies, 08.12.2020 14:00
Questions on the website: 13722362