Operating Systems II, Spring 2006, HW 6
These problems will not be covered in any practise session. Discuss them with your project group or other students.
- Password search
- Problem 16.1 from text book [Stal 05, p. 722] (problem 15.1 [Stal 01, p. 690])
- Problem 16.4 from text book [Stal 05] (problem 15.4 [Stal 01])
- What can you deduce from this?
- Password salt
- Problem 16.7 from text book [Stal 05] (problem 15.7 [Stal 01])
- Problem 16.8 from text book [Stal 05] (problem 15.8 [Stal 01])
- Is there real practical advantage with salt?
- Multilevel security
- Problem 16.10 from text book [Stal 05] (problem 15.9 [Stal 01])
- Problem 16.11 from text book [Stal 05] (problem 15.10 [Stal 01])
- Why would MAC be safer than DAC (discretionary access control)?
- "No read up" and "no write down" MAC policy protects data access,
but not data integrity. Why? Give an example.
- User A owns file ASecret, which only A can read or write. A has program AGame, which can use file ASecret during execution? A lets user B play the game AGame and during playing B can read or write file ASecret.
- How would one implement the scheme described above in UNIX?
- How would one implement the scheme described above in W2000?
- How does the situation change, if B should be able read ASecret during
playing, but not to write into it?
Give new answers to parts a and b.
- Clustering and Grid-computing (as defined at the end of Lecture 12)
- Give an example application that would be suitable for Beowulf Linux Cluster'iin, but not for Windows 2000 Cluster Server. Why?
- Give an example application that would be suitable for clusters but not for grids. Why?
- Which synchronization primitives are suitable for SMP, but not for clusters? Why?
- Which synchronization primitives are suitable for clusters, but
not for grids? Why?
Teemu Kerola 31.03.2006 9:36