100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Solutions for Access Control, Security, and Trust, A Logical Approach, 1st Edition Chin (All Chapters included) $29.49   Add to cart

Exam (elaborations)

Solutions for Access Control, Security, and Trust, A Logical Approach, 1st Edition Chin (All Chapters included)

 8 views  0 purchase
  • Course
  • IT SECURITY
  • Institution
  • IT SECURITY

Complete Solutions Manual for Access Control, Security, and Trust, A Logical Approach, 1st Edition by Shiu-Kai Chin, Susan Beth Older ; ISBN13: 9781584888628. (Full Chapters included Chapter 1 to 14)....Access Control, Security, Trust, and Logic ; A Language for Access Control ; Reasoning about Acc...

[Show more]

Preview 3 out of 89  pages

  • February 25, 2024
  • 89
  • 2011/2012
  • Exam (elaborations)
  • Questions & answers
  • IT SECURITY
  • IT SECURITY
avatar-seller
mizhouubcca
SOLUTIONS MANUAL FOR
Access Control,
Security and Trust:
A Logical Approach


Complete Chapter Solutions Manual
are included (Ch 1 to 14)




by
Shiu-Kai Chin
Susan Beth Older

** Immediate Download
** Swift Response
** All Chapters included

,Access Control, Security, and Trust: A Logical Approach Sample Solutions


Chapter 1
Exercise 1.0.1
• The request is to remove books from the library

• The books are being protected
• The guards are the librarians
• The librarians allow books to be removed based on a valid library card (a ticket)

Exercise 1.0.2
• What is being requested includes
– Reading account balances and activities
– Transferring funds to other accounts

• Customer accounts are being protected
• The guards include the website checking userids and passwords
• The decision to grant access is made based on userids and passwords

Exercise 1.0.3
• Guard checking ticket and government issued ID is checking your identity and
if you have a flight leaving the airport that day

• Guard checking bags is checking if you are carrying any objects deemed a secu-
rity threat such as firearms, explosives, etc.
• Ticket agent checking boarding pass is checking if you have an authorized seat
on the flight

Exercise 1.1.1 This is about authenticating legitimate users/credit card holders on
the basis of checking if the internet customer possesses the physical credit card. The
name, account number, expiration date, and security code are aimed at determining
if the internet customer possesses the card. (This is the purpose of asking for the
security code). The assumption is that people who have physical access to the card are
legitimate customers (unless the card is reported as stolen).




2 D O N OT D ISTRIBUTE

, Access Control, Security, and Trust: A Logical Approach Sample Solutions


Chapter 2
Exercise 2.1.1
a. P ({x, y, z}) = {0,
/ {x}, {y}, {z}, {x, y}, {x, z}, {y, z}, {x, y, z}}

b. U(3) = {3, 2}
c. U(4) = 0/
d. T ∪U = {(1, 1), (1, 3), (2, 1), (2, 4), (3, 2)(3, 3), (3, 4), (4, 4)}

e. T ∩U = {(3, 3)}
f. T −U = {(1, 1), (2, 1), (4, 4), (3, 4)}
g. U ◦ T = {(2, 4), (1, 3), (1, 4), (3, 3), (3, 4), (3, 1)}
h. T ◦U = {(1, 3), (2, 3), (3, 3), (3, 2)}

Exercise 2.1.2 Let R, S, T be relations such that R ⊆ S, and consider an arbitrary
element (x, z) ∈ R ◦ T . By definition of ◦, there exists some y such that (x, y) ∈ R and
(y, z) ∈ T . Because R ⊆ S, we know that (x, y) ∈ S. It follows that (x, z) ∈ S ◦T . Because
(x, z) was an arbitrary element of R ◦ T , we have shown that R ◦ T ⊆ S ◦ T .

Exercise 2.1.3 Consider arbitrary relations R, S, T . Our analysis involves two steps:
1. Consider an arbitrary element (x, z) of (R ∪ S) ◦ T ; by definition of ◦, there exists
y such that
(x, y) ∈ R ∪ S, (y, z) ∈ T.
Because (x, y) ∈ R ∪ S, either (x, y) ∈ R (in which case (x, z) ∈ R ◦ T ) or (x, y) ∈ S
(in which case (x, z) ∈ S ◦ T ). In either case, (x, z) ∈ (R ◦ T ) ∪ (S ◦ T ).
Because (x, z) was arbitrary, (R ∪ S) ◦ T ⊆ (R ◦ T ) ∪ (S ◦ T ).
2. Consider an arbitrary element (x, z) of (R ◦ T ) ∪ (S ◦ T ). It follows that (x, z) is
an element of R ◦ T or S ◦ T (or both); without loss of generality, assume that
(x, z) ∈ R ◦ T . By the definition of ◦, there exists some y such that (x, y) ∈ R and
(y, z) ∈ T .
Because (x, y) ∈ R, we also know that (x, y) ∈ R∪S, and hence (x, z) ∈ (R∪S)◦T .
Because (x, z) was arbitrary, (R ◦ T ) ∪ (S ◦ T ) ⊆ (R ∪ S) ◦ T .
Having demonstrated that each set is a subset of the other, we have shown that

(R ∪ S) ◦ T = (R ◦ T ) ∪ (S ◦ T ).




3 D O N OT D ISTRIBUTE

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller mizhouubcca. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $29.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$29.49
  • (0)
  Add to cart