discussion post

Read the fist section of the article by Saltzer and Shroeder posted in the Resources module.

List three principles from the Saltzer and Shroeder article that underlie an effective access control mechanism. Describe how these principles manifest themselves in access control mechanisms and explain why they are important.  Give concrete examples.