Suppose a per-subject access control list is used. Deleting an object in such a system is inconvenient because all changes must be made to the control lists of all subjects who did have access to the object. Suggest an alternative, less costly means of handling deletion

What will be an ideal response?


There
are
many
different
approaches.
The
reason
these
updates
need
to
be
made
is
in
case
a
txt1.txt
is
deleted,
and
a
new
txt1.txt
is
created
in
its
placeā€”the
new
txt1.txt
should
not
inherit
its
predecessor's
permissions.
A
way
to
circumvent
this
issue
is
to
take
the
following
steps:
1)
When
an
object
is
deleted,
instead
of
deleting
it
from
the
object
store,
append
to
it
a
signifier
to
indicate
that
it
has
been
deleted.
If
any
subject
attempts
to
access
a
deleted
object,
delete
the
access
control
entry.
2)
When
a
file
is
created,
check
to
see
if
it
has
a
predecessor
(a
deleted
file
with
the
same
name).
If
it
has
a
predecessor,
remove
all
of
those
predecessor's
permissions
(by
following
the
delete
procedure
explained
previously).
This
will
limit
the
instances
of
the
"expensive"
delete
procedure
by
only
using
it
in
order
to
prevent
accidental
inheritance
of
permissions
from
a
similarly
named
but
since
deleted
file.

Computer Science & Information Technology

You might also like to view...

To define a field for a table, you begin by selecting a(n) __________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The Apache OpenOffice database application is called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following statements about the Create from file feature in Word is TRUE?

A) The file does not have to be open to be inserted into a document. B) Only a portion of the file can be inserted into the open document. C) The Create from file option is available by clicking the Review tab, then the Object arrow. D) You do not have to place the cursor where you want the closed file to be inserted because a dialog box will pop up and ask you for the desired location.

Computer Science & Information Technology

Programming languages must be converted from a human-readable form to a machine-readable form by a specialized piece of software called a ____.

A. binary code B. method C. compiler D. programmer

Computer Science & Information Technology