MCS-274 Homework (Spring 2005)
Prior to the first test
- Problem 2.3, p. 25
- Problem 2.4, p. 25
- Problem 2.6, p. 26
- Problem 2.13, p. 27. Under what circumstances would the violation
be noticed?
- Problem 2.14, p. 27
- Problem 3.6, p. 66
- Problem 3.8, p. 67
- Problem 3.16, p.68. Make sure no undesirable accesses are allowed
and, to the extent possible, all desirable accesses are allowed.
However, don't worry if the limited nature of the access control
mechanism means some desirable accesses are necessarily ruled out.
- Problem 4.3, p. 123
- Problem 4.11, p. 125
- Problem 4.13, p. 125
- Problem 5.1, p. 188
- Problem 5.10, pp. 188-89, parts (a)-(c) only, and version (i) only
Instructor: Max Hailperin