3. Access Control
January-2004 [12]
3.
a) Explain
briefly about Mandatory Access Control and Discretionary Access Control.
[6]
b) Describe
briefly the Bell-La Padula model and its limitations. [6]
July-2004 [11]
1.
e) What are
access control lists and capability lists? In what ways they differ in their
organization? [4]
2.
c) Discuss no
read up and no write down security policies and the tranquility
principle in Bell
– La Padula security model. [7]
January-2005 [4]
1.
b) With respect
to an operating system, what is the primary security benefit of access control
lists? [4]
July-2005 [6]
4.
a) Explain
briefly about Mandatory Access Control and Discretionary Access Control. [6]
January-2006 [11]
2.
c) What is the importance of "no read
up" plus "no write down" rule for a multilevel security system? [3]
6.
a) Describe briefly the Bell-La Padula
Model and its limitations. What is tranquility principle in this model?
[8]
July-2006 [0]
January-2007 [6]
6.
c) Why
are each initiator and each target assigned to one or more security groups in
an access control scheme based on security labels? [6]
July-2007 [7]
1.
a) What
is access control? Differentiate between discretionary or mandatory access
control techniques. [4]
7.
a) Mandatory
Access Control (MAC) is an access policy determined by the system, not the
owner. Is it true or false? Justify. [3]
January-2008 [4]
1.
a) What
do you understand by mandatory (non-discretionary) access control? What are the
mandatory access control rules? [4]
July-2008 [12]
1.
c) Mandatory
access control (MAC) is an access policy determined by the system, not the
owner. Is it true or false? Justify. [4]
4.
a) What is access control method?
Explain the following access control model:
i) Bell-La Padula Model
ii) Biba Integrity Model [8]
January-2009 [6]
2.
a) Explain how NFTS permissions are
better than share permissions. [6]
July-2009 [15]
4.
a) What
do you understand by Access Control List? Briefly explain discretionary and
mandatory access control. [6]
7.
b) Describe
briefly the Bell-La Padula Model and its limitations. What is tranquility
principle in this model? [9]
January-2010 [8]
5.
b) Write the formal definition of
Role based access model. What are the advantages of using Role based control
over Mandatory access control (MAC) and Discretionary access control (DAC)? [8]
July-2010 [0]
No comments:
Post a Comment