What are the characteristics of the Hydra system?
(a) It consists of known access rights and interpreted by the system
(b) A user can of protection system can declare other rights
(c) Hydra system is not flexible
(d) Hydra doesn’t provide rights amplification
The question was asked during a job interview.
I'm obligated to ask this question of Protection in section Protection of Operating System