SlideShare a Scribd company logo
1 of 19
Module 18: Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protection ,[object Object],[object Object],[object Object]
Domain Structure ,[object Object],[object Object]
Domain Implementation  (UNIX) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Domain Implementation (Multics) ,[object Object],[object Object],Multics Rings
Access Matrix ,[object Object],[object Object],[object Object],[object Object]
Access Matrix Figure A
Use of Access Matrix ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Use of Access Matrix (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implementation of Access Matrix ,[object Object],[object Object],[object Object],[object Object],[object Object]
Access Matrix of Figure A With Domains as Objects Figure B
Access Matrix with  Copy  Rights
Access Matrix With  Owner  Rights
Modified Access Matrix of Figure B
Revocation of Access Rights ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Capability-Based Systems  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Language-Based Protection ,[object Object],[object Object],[object Object]
Protection in Java 2 ,[object Object],[object Object],[object Object],[object Object]
Stack Inspection

More Related Content

What's hot (17)

Operating system
Operating systemOperating system
Operating system
 
Windows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolWindows Architecture Explained by Stacksol
Windows Architecture Explained by Stacksol
 
OS_Ch3
OS_Ch3OS_Ch3
OS_Ch3
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
 
Chapter 6 os
Chapter 6 osChapter 6 os
Chapter 6 os
 
Advanced Operating System- Introduction
Advanced Operating System- IntroductionAdvanced Operating System- Introduction
Advanced Operating System- Introduction
 
Cs8493 unit 5
Cs8493 unit 5Cs8493 unit 5
Cs8493 unit 5
 
OSCh19
OSCh19OSCh19
OSCh19
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
 
2. microkernel new
2. microkernel new2. microkernel new
2. microkernel new
 
CS9222 Advanced Operating System
CS9222 Advanced Operating SystemCS9222 Advanced Operating System
CS9222 Advanced Operating System
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Kernel (OS)
Kernel (OS)Kernel (OS)
Kernel (OS)
 
Windows xp
Windows xpWindows xp
Windows xp
 
Unit 1 architecture of distributed systems
Unit 1 architecture of distributed systemsUnit 1 architecture of distributed systems
Unit 1 architecture of distributed systems
 
system calls, single user, multiuser os ...
system calls, single user, multiuser os                                      ...system calls, single user, multiuser os                                      ...
system calls, single user, multiuser os ...
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
 

Viewers also liked

Peace Corps Wiki and Peace Corps Journals
Peace Corps Wiki and Peace Corps JournalsPeace Corps Wiki and Peace Corps Journals
Peace Corps Wiki and Peace Corps Journalswilljermuk
 
Communities & Communication in VeSeL
Communities & Communication in VeSeLCommunities & Communication in VeSeL
Communities & Communication in VeSeLJoshua Underwood
 
Presentation sig2015
Presentation sig2015Presentation sig2015
Presentation sig2015TeamDev
 
Livinbrand 2016 - Jakub Michl, Beneš & Michl: Jak prosazujeme branding ve fir...
Livinbrand 2016 - Jakub Michl, Beneš & Michl: Jak prosazujeme branding ve fir...Livinbrand 2016 - Jakub Michl, Beneš & Michl: Jak prosazujeme branding ve fir...
Livinbrand 2016 - Jakub Michl, Beneš & Michl: Jak prosazujeme branding ve fir...Ondřej Rudolf
 
User Testing Tactics
User Testing TacticsUser Testing Tactics
User Testing TacticsCindy Alvarez
 
The Life Cycle Of A Wireframe: LOL Cats Style
The Life Cycle Of A Wireframe: LOL Cats StyleThe Life Cycle Of A Wireframe: LOL Cats Style
The Life Cycle Of A Wireframe: LOL Cats StyleNick Finck
 
Ch12 OS
Ch12 OSCh12 OS
Ch12 OSC.U
 
solar system_yasmine
solar system_yasminesolar system_yasmine
solar system_yasmineebando1975
 
Scenario based contextual learning design
Scenario based contextual learning designScenario based contextual learning design
Scenario based contextual learning designJoshua Underwood
 
CategoríA Informativa
CategoríA InformativaCategoríA Informativa
CategoríA Informativatat
 
How am I doing compared to other companies?
How am I doing compared to other companies?How am I doing compared to other companies?
How am I doing compared to other companies?Cindy Alvarez
 
Future Of Content
Future Of ContentFuture Of Content
Future Of ContentNick Finck
 
Pink Aveona
Pink AveonaPink Aveona
Pink Aveonaanaq
 
Ch13 OS
Ch13 OSCh13 OS
Ch13 OSC.U
 
UMBEL Semantic Web Services
UMBEL Semantic Web ServicesUMBEL Semantic Web Services
UMBEL Semantic Web ServicesMike Bergman
 

Viewers also liked (20)

Os8
Os8Os8
Os8
 
Salzburg
SalzburgSalzburg
Salzburg
 
Peace Corps Wiki and Peace Corps Journals
Peace Corps Wiki and Peace Corps JournalsPeace Corps Wiki and Peace Corps Journals
Peace Corps Wiki and Peace Corps Journals
 
Communities & Communication in VeSeL
Communities & Communication in VeSeLCommunities & Communication in VeSeL
Communities & Communication in VeSeL
 
Presentation sig2015
Presentation sig2015Presentation sig2015
Presentation sig2015
 
Mobile UX
Mobile UXMobile UX
Mobile UX
 
Scaling 101
Scaling 101Scaling 101
Scaling 101
 
Livinbrand 2016 - Jakub Michl, Beneš & Michl: Jak prosazujeme branding ve fir...
Livinbrand 2016 - Jakub Michl, Beneš & Michl: Jak prosazujeme branding ve fir...Livinbrand 2016 - Jakub Michl, Beneš & Michl: Jak prosazujeme branding ve fir...
Livinbrand 2016 - Jakub Michl, Beneš & Michl: Jak prosazujeme branding ve fir...
 
User Testing Tactics
User Testing TacticsUser Testing Tactics
User Testing Tactics
 
The Life Cycle Of A Wireframe: LOL Cats Style
The Life Cycle Of A Wireframe: LOL Cats StyleThe Life Cycle Of A Wireframe: LOL Cats Style
The Life Cycle Of A Wireframe: LOL Cats Style
 
Ch12 OS
Ch12 OSCh12 OS
Ch12 OS
 
Getting To "Paid"
Getting To "Paid"Getting To "Paid"
Getting To "Paid"
 
solar system_yasmine
solar system_yasminesolar system_yasmine
solar system_yasmine
 
Scenario based contextual learning design
Scenario based contextual learning designScenario based contextual learning design
Scenario based contextual learning design
 
CategoríA Informativa
CategoríA InformativaCategoríA Informativa
CategoríA Informativa
 
How am I doing compared to other companies?
How am I doing compared to other companies?How am I doing compared to other companies?
How am I doing compared to other companies?
 
Future Of Content
Future Of ContentFuture Of Content
Future Of Content
 
Pink Aveona
Pink AveonaPink Aveona
Pink Aveona
 
Ch13 OS
Ch13 OSCh13 OS
Ch13 OS
 
UMBEL Semantic Web Services
UMBEL Semantic Web ServicesUMBEL Semantic Web Services
UMBEL Semantic Web Services
 

Similar to Module 18: Key Concepts of OS Protection Domains

21CSC202J Operating Systems-Unit-V.pptx.pdf
21CSC202J Operating Systems-Unit-V.pptx.pdf21CSC202J Operating Systems-Unit-V.pptx.pdf
21CSC202J Operating Systems-Unit-V.pptx.pdfanusri1904
 
Protection Structures & Capabilities in Operating System
Protection Structures & Capabilities in Operating SystemProtection Structures & Capabilities in Operating System
Protection Structures & Capabilities in Operating SystemMeghaj Mallick
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating systemBhagyashree Barde
 
report on network security fundamentals
report on network security fundamentalsreport on network security fundamentals
report on network security fundamentalsJassika
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system securityG Prachi
 
Protection Domain and Access Matrix Model -Operating System
Protection Domain and Access Matrix Model -Operating SystemProtection Domain and Access Matrix Model -Operating System
Protection Domain and Access Matrix Model -Operating SystemLalfakawmaKh
 
Unix SVR4/OpenSolaris and allumos Access Control
Unix SVR4/OpenSolaris and allumos Access ControlUnix SVR4/OpenSolaris and allumos Access Control
Unix SVR4/OpenSolaris and allumos Access ControlSalem Elbargathy
 
Access control by amin
Access control by aminAccess control by amin
Access control by aminaminpathan11
 
Aos v unit protection and access control
Aos v unit protection and access controlAos v unit protection and access control
Aos v unit protection and access controlvanamali_vanu
 
XPDS16: XSM-Flask, current limitations and Ongoing work. - Anshul Makkar, Ct...
XPDS16:  XSM-Flask, current limitations and Ongoing work. - Anshul Makkar, Ct...XPDS16:  XSM-Flask, current limitations and Ongoing work. - Anshul Makkar, Ct...
XPDS16: XSM-Flask, current limitations and Ongoing work. - Anshul Makkar, Ct...The Linux Foundation
 
Security Policies
Security PoliciesSecurity Policies
Security Policiesphanleson
 
Protection and security of operating system
Protection and security of operating systemProtection and security of operating system
Protection and security of operating systemAbdullah Khosa
 
1.1 Cyber Security Layers of Defense and Technology Solutions.pdf.pdf
1.1 Cyber Security Layers of Defense and Technology Solutions.pdf.pdf1.1 Cyber Security Layers of Defense and Technology Solutions.pdf.pdf
1.1 Cyber Security Layers of Defense and Technology Solutions.pdf.pdfThangVuQuang4
 

Similar to Module 18: Key Concepts of OS Protection Domains (20)

21CSC202J Operating Systems-Unit-V.pptx.pdf
21CSC202J Operating Systems-Unit-V.pptx.pdf21CSC202J Operating Systems-Unit-V.pptx.pdf
21CSC202J Operating Systems-Unit-V.pptx.pdf
 
Os8
Os8Os8
Os8
 
Protection Structures & Capabilities in Operating System
Protection Structures & Capabilities in Operating SystemProtection Structures & Capabilities in Operating System
Protection Structures & Capabilities in Operating System
 
Protection
ProtectionProtection
Protection
 
14.Protection
14.Protection14.Protection
14.Protection
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating system
 
Ch13 protection
Ch13   protectionCh13   protection
Ch13 protection
 
report on network security fundamentals
report on network security fundamentalsreport on network security fundamentals
report on network security fundamentals
 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system security
 
Protection Domain and Access Matrix Model -Operating System
Protection Domain and Access Matrix Model -Operating SystemProtection Domain and Access Matrix Model -Operating System
Protection Domain and Access Matrix Model -Operating System
 
Unix SVR4/OpenSolaris and allumos Access Control
Unix SVR4/OpenSolaris and allumos Access ControlUnix SVR4/OpenSolaris and allumos Access Control
Unix SVR4/OpenSolaris and allumos Access Control
 
Access control by amin
Access control by aminAccess control by amin
Access control by amin
 
ch17.pptx
ch17.pptxch17.pptx
ch17.pptx
 
Aos v unit protection and access control
Aos v unit protection and access controlAos v unit protection and access control
Aos v unit protection and access control
 
Protection
ProtectionProtection
Protection
 
Security
SecuritySecurity
Security
 
XPDS16: XSM-Flask, current limitations and Ongoing work. - Anshul Makkar, Ct...
XPDS16:  XSM-Flask, current limitations and Ongoing work. - Anshul Makkar, Ct...XPDS16:  XSM-Flask, current limitations and Ongoing work. - Anshul Makkar, Ct...
XPDS16: XSM-Flask, current limitations and Ongoing work. - Anshul Makkar, Ct...
 
Security Policies
Security PoliciesSecurity Policies
Security Policies
 
Protection and security of operating system
Protection and security of operating systemProtection and security of operating system
Protection and security of operating system
 
1.1 Cyber Security Layers of Defense and Technology Solutions.pdf.pdf
1.1 Cyber Security Layers of Defense and Technology Solutions.pdf.pdf1.1 Cyber Security Layers of Defense and Technology Solutions.pdf.pdf
1.1 Cyber Security Layers of Defense and Technology Solutions.pdf.pdf
 

More from C.U

Ch21 OS
Ch21 OSCh21 OS
Ch21 OSC.U
 
Ch20 OS
Ch20 OSCh20 OS
Ch20 OSC.U
 
Ch19 OS
Ch19 OSCh19 OS
Ch19 OSC.U
 
Ch17 OS
Ch17 OSCh17 OS
Ch17 OSC.U
 
Ch16 OS
Ch16 OSCh16 OS
Ch16 OSC.U
 
Ch15 OS
Ch15 OSCh15 OS
Ch15 OSC.U
 
Ch14 OS
Ch14 OSCh14 OS
Ch14 OSC.U
 
Ch11 OS
Ch11 OSCh11 OS
Ch11 OSC.U
 
Ch10 OS
Ch10 OSCh10 OS
Ch10 OSC.U
 
Ch6
Ch6Ch6
Ch6C.U
 
Ch9 OS
Ch9 OSCh9 OS
Ch9 OSC.U
 
Ch8 OS
Ch8 OSCh8 OS
Ch8 OSC.U
 
Ch7 OS
Ch7 OSCh7 OS
Ch7 OSC.U
 
Ch1 OS
Ch1 OSCh1 OS
Ch1 OSC.U
 
Ch2 OS
Ch2 OSCh2 OS
Ch2 OSC.U
 
Ch3 OS
Ch3 OSCh3 OS
Ch3 OSC.U
 
Ch5 OS
Ch5 OSCh5 OS
Ch5 OSC.U
 
Flash Memory OS
Flash Memory OSFlash Memory OS
Flash Memory OSC.U
 
Ch4 OS
Ch4 OSCh4 OS
Ch4 OSC.U
 
Protocols Overview
Protocols OverviewProtocols Overview
Protocols OverviewC.U
 

More from C.U (20)

Ch21 OS
Ch21 OSCh21 OS
Ch21 OS
 
Ch20 OS
Ch20 OSCh20 OS
Ch20 OS
 
Ch19 OS
Ch19 OSCh19 OS
Ch19 OS
 
Ch17 OS
Ch17 OSCh17 OS
Ch17 OS
 
Ch16 OS
Ch16 OSCh16 OS
Ch16 OS
 
Ch15 OS
Ch15 OSCh15 OS
Ch15 OS
 
Ch14 OS
Ch14 OSCh14 OS
Ch14 OS
 
Ch11 OS
Ch11 OSCh11 OS
Ch11 OS
 
Ch10 OS
Ch10 OSCh10 OS
Ch10 OS
 
Ch6
Ch6Ch6
Ch6
 
Ch9 OS
Ch9 OSCh9 OS
Ch9 OS
 
Ch8 OS
Ch8 OSCh8 OS
Ch8 OS
 
Ch7 OS
Ch7 OSCh7 OS
Ch7 OS
 
Ch1 OS
Ch1 OSCh1 OS
Ch1 OS
 
Ch2 OS
Ch2 OSCh2 OS
Ch2 OS
 
Ch3 OS
Ch3 OSCh3 OS
Ch3 OS
 
Ch5 OS
Ch5 OSCh5 OS
Ch5 OS
 
Flash Memory OS
Flash Memory OSFlash Memory OS
Flash Memory OS
 
Ch4 OS
Ch4 OSCh4 OS
Ch4 OS
 
Protocols Overview
Protocols OverviewProtocols Overview
Protocols Overview
 

Module 18: Key Concepts of OS Protection Domains