Download presentation
Presentation is loading. Please wait.
Published byAdrian Phillips Modified over 9 years ago
1
ANKITA NAIK
2
INTRODUCTION g598 An access matrix is a model of system resources protection. It consists of rows and columns. The rows of access matrix represent domains, and columns represent objects. Each entry in the matrix consists of a set of access rights. The entry access(i,j) defines the set of operations that a process executing in domain D i can invoke object O j.
3
Access Matrix G598
4
Explanation of the above figure There are 4 domains and 4 objects - three files(F1,F2,F3) and one laser printer. A process executing in domain D1 can read files F1 and F3. A process executing in domain D4 can read and write the onto files F1 and F3. The laser printer can be accessed only by a process executing in domain D2. G598
5
USING SWITCH Processes should be able to switch from one domain to other so right(switch) is used. Switching from domain D i to D j is allowed only if access right switch € access(i,j). In the fig a process executing in domain D2 can switch to domain D3 or D4. a process executing in domain D4 can switch to domain D1 and D1 can switch to D2. G599
6
Access Matrix of fig 14.3 with Domains as Objects G599
7
Function of Access Matrix provides mechanism consisting of implementing the access matrix and ensuring that semantic properties,we have outlined hold. It implements policy decisions concerning protection. The user normally decides the contents of access matrix entries i.e. who can access what object in what mode. G599
8
Operations(access rights) In order for change to take place in the contents of access matrix three additional operations required are as follows: copy rights Owner rights Control rights G600
9
Access Matrix with Copy Rights The copy right allows the access right to be copied only within the column for which the right is defined. The ability to copy an access right from one domain to another is denoted by an asterisk(*) appended to the access right. For e.g. in the above fig a,a process executing in domain D2 can copy read operation into any entry in file F2. G600
10
Access Matrix with Copy Rights G600
11
Copy Rights This copy right can be divided into two variants: transfer and limited copy. 1) Transfer : A right copied from access(i, j) to access (k, j);it is then removed from access(i, j).this action is transfer of right. 2) Limited: propagation of copy right is limited i.e. when the right R* is copied from access(i, j) to access(k, j),only R is created (not R*). G600
12
Owner Rights The owner rights controls operation to allow addition of new rights and removal of the some rights. If access(I,j) includes the owner right, then a processes executing in domain Di can add and remove any right in any entry in column j. For eg,in fig below, domain D1 is the owner of F1 and thus can add and delete any valid right in column F1. Similarly, domain D2 is the owner of F2 and F3 and thus can add and remove any valid right within these two columns. G601
13
Access Matrix With Owner Rights G601
14
Control Rights The control right is applicable only to domain objects. If access(I,j) includes the control right, then process executing in Di can remove any access right from row j. For e.g.,in fig 14.4,we include the control right in access(D2,D4). Then a process executing in domain D2 could modify domain D4 as shown n fig 14.7. G601
15
Modified Access Matrix of Figure 14.4 G601
16
Questions: Write a short note on access matrix. Explain access matrix as a model of protection.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.