subject

Consider the following scenario. An organization employs product managers, programmers and testers. The organization operates with the following kinds of files: development code and executables, testing code and executables, test reports, and production code and executables. Product Managers can view, and execute the development executables and production executables to verify correctness. Programmers can create, edit, delete, and execute development code and executables. Programmers can also promote development code to the test level. Testers can edit, delete, and execute test code and executables. The testers write test reports that can be read by everyone. The testers can promote test code to production level or demote it back to development. Everyone can view and execute production code and executables. Eve is the product manager, Alice and Bob are programmers. Carol and Dave are testers a) Define the rights the access control system would need to enforce the requirements for this scenario. Associate the abbreviation you will use in part b and c with the definition.
b) Design an access control matrix for the scenario for the users.
c) Assume the Access Matrix is being implemented by a system using Access Control Lists. Write the Access Control List for the Development Executables.
d) Assume the Access Matrix is being implemented by a Capability system. Write the Capability list for Alice.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 16:00
Kenny works with an it company. his company is about to launch new software in the market. he has to ensure that this new software is functional and meets all of the quality standards set up at the planning stage. which job profile is kenny likely to have? kenny is likely to have the job profile of a blank .
Answers: 2
question
Computers and Technology, 24.06.2019 15:30
What is the function of compilers and interpreters? how does a compiler differ from an interpreter?
Answers: 2
question
Computers and Technology, 24.06.2019 16:00
Your is an example of personal information that you should keep private.
Answers: 1
question
Computers and Technology, 24.06.2019 18:00
Your computer running windows 10 is doing some very strange things with the operating system. you are fairly certain it is not a hardware issue. you need to try to get further insight into what is going on within the operating system. which tool would be best-suited for this?
Answers: 1
You know the right answer?
Consider the following scenario. An organization employs product managers, programmers and testers....
Questions
question
Computers and Technology, 14.07.2019 16:30
Questions on the website: 13722367