欢迎来到三一办公! | 帮助中心 三一办公31ppt.com(应用文档模板下载平台)
三一办公
全部分类
  • 办公文档>
  • PPT模板>
  • 建筑/施工/环境>
  • 毕业设计>
  • 工程图纸>
  • 教育教学>
  • 素材源码>
  • 生活休闲>
  • 临时分类>
  • ImageVerifierCode 换一换
    首页 三一办公 > 资源分类 > PPT文档下载  

    operatingsystem《操作系统》ch.ppt

    • 资源ID:6513279       资源大小:607KB        全文页数:25页
    • 资源格式: PPT        下载积分:15金币
    快捷下载 游客一键下载
    会员登录下载
    三方登录下载: 微信开放平台登录 QQ登录  
    下载资源需要15金币
    邮箱/手机:
    温馨提示:
    用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP免费专享
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    operatingsystem《操作系统》ch.ppt

    Chapter 14:Protection,Chapter 14:Protection,Goals of Protection Principles of ProtectionDomain of Protection Access Matrix Implementation of Access Matrix Access ControlRevocation of Access Rights Capability-Based Systems Language-Based Protection,Objectives,Discuss the goals and principles of protection in a modern computer systemExplain how protection domains combined with an access matrix are used to specify the resources a process may accessExamine capability and language-based protection systems,Goals of Protection,Operating system consists of a collection of objects,hardware or softwareEach object has a unique name and can be accessed through a well-defined set of operations.Protection problem-ensure that each object is accessed correctly and only by those processes that are allowed to do so.,Principles of Protection,Guiding principle principle of least privilegePrograms,users and systems should be given just enough privileges to perform their tasks,Domain Structure,Access-right=where rights-set is a subset of all valid operations that can be performed on the object.Domain=set of access-rights,Domain Implementation(UNIX),System consists of 2 domains:UserSupervisorUNIX Domain=user-idDomain switch accomplished via file system.Each file has associated with it a domain bit(setuid bit).When file is executed and setuid=on,then user-id is set to owner of the file being executed.When execution completes user-id is reset.,Domain Implementation(MULTICS),Let Di and Dj be any two domain rings.If j I Di Dj,Access Matrix,View protection as a matrix(access matrix)Rows represent domainsColumns represent objectsAccess(i,j)is the set of operations that a process executing in Domaini can invoke on Objectj,Access Matrix,Use of Access Matrix,If a process in Domain Di tries to do“op”on object Oj,then“op”must be in the access matrix.Can be expanded to dynamic protection.Operations to add,delete access rights.Special access rights:owner of Oicopy op from Oi to Ojcontrol Di can modify Dj access rightstransfer switch from domain Di to Dj,Use of Access Matrix(Cont.),Access matrix design separates mechanism from policy.Mechanism Operating system provides access-matrix+rules.If ensures that the matrix is only manipulated by authorized agents and that rules are strictly enforced.PolicyUser dictates policy.Who can access what object and in what mode.,Implementation of Access Matrix,Each column=Access-control list for one object Defines who can perform what operation.Domain 1=Read,WriteDomain 2=ReadDomain 3=Read Each Row=Capability List(like a key)Fore each domain,what operations allowed on what objects.Object 1 ReadObject 4 Read,Write,ExecuteObject 5 Read,Write,Delete,Copy,Access Matrix of Figure A With Domains as Objects,Figure B,Access Matrix with Copy Rights,Access Matrix With Owner Rights,Modified Access Matrix of Figure B,Access Control,Protection can be applied to non-file resourcesSolaris 10 provides role-based access control to implement least privilegePrivilege is right to execute system call or use an option within a system callCan be assigned to processesUsers assigned roles granting access to privileges and programs,Role-based Access Control in Solaris 10,Revocation of Access Rights,Access List Delete access rights from access list.Simple ImmediateCapability List Scheme required to locate capability in the system before capability can be revoked.ReacquisitionBack-pointersIndirectionKeys,Capability-Based Systems,HydraFixed set of access rights known to and interpreted by the system.Interpretation of user-defined rights performed solely by users program;system provides access protection for use of these rights.Cambridge CAP System Data capability-provides standard read,write,execute of individual storage segments associated with object.Software capability-interpretation left to the subsystem,through its protected procedures.,Language-Based Protection,Specification of protection in a programming language allows the high-level description of policies for the allocation and use of resources.Language implementation can provide software for protection enforcement when automatic hardware-supported checking is unavailable.Interpret protection specifications to generate calls on whatever protection system is provided by the hardware and the operating system.,Protection in Java 2,Protection is handled by the Java Virtual Machine(JVM)A class is assigned a protection domain when it is loaded by the JVM.The protection domain indicates what operations the class can(and cannot)perform.If a library method is invoked that performs a privileged operation,the stack is inspected to ensure the operation can be performed by the library.,Stack Inspection,End of Chapter 14,

    注意事项

    本文(operatingsystem《操作系统》ch.ppt)为本站会员(小飞机)主动上传,三一办公仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三一办公(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    备案号:宁ICP备20000045号-2

    经营许可证:宁B2-20210002

    宁公网安备 64010402000987号

    三一办公
    收起
    展开