Download Ch.14 flash cards | C S 3113 - Introduction to Operating Systems and more Quizzes Computer Science in PDF only on Docsity! TERM 1 Principles of Protection DEFINITION 1 dictates that programs, users, and even systems be given just enough privileges to perform their tasks. TERM 2 neet-to-know principle DEFINITION 2 process should be allowed to access only those resources for which it authorization. Furthermore, at any time, a process should be able to access only those resources that it currently requires to complete its task. TERM 3 protection domain DEFINITION 3 specifies the resources that the process may access. TERM 4 access right DEFINITION 4 ability to execute an operation on an object TERM 5 static association DEFINITION 5 set of resources available to the process is fixed throughout the process's lifetime! use need-to-know principle for static association TERM 6 dynamic association DEFINITION 6 set of resources available to the process is not fixed throughout the process's lifetime! mechanism is available to allow domain switching, enabling the process to sV'..ritch from one domain. to another. TERM 7 1st way a domain can be realized DEFINITION 7 Each user may be a domain. In this case, the set of objects that can be accessed depends on the identity of the user. Domain switching occurs when the user is changed-generally when one user logs out and another user logs in. TERM 8 2nd way a domain can be realized DEFINITION 8 Each process may be a domain. In this case, the set of objects that can be accessed depends on the identity of the process. Domain switching occurs when one process sends a message to another process and then waits for a response. TERM 9 3rd way a domain can be realized DEFINITION 9 Each procedure may be a domain. In this case, the set of objects that can be accessed corresponds to the local variables defined within. the procedure. Domain switching occurs when a procedure call is made. TERM 10 monitor-user mode model DEFINITION 10 When a process executes in monitor mode, it can execute privileged instructions and thus gain complete control of the computer system. In contrast, when a process executes in user mode, it can invoke only non-privileged instructions. Consequently, it can execute only within its predefined memory space.