Operating System Services Security
Next:
POSIX Security Interfaces
Up:
Security in Open Systems
Previous:
Relationship to Open
Operating System Services Security
POSIX Security Interfaces and Mechanisms
Introduction to POSIX Security
Posix Security Functionality
FIPS 151-2 Security Mechanisms and Interfaces (P1003.1)
Data Structures and the Interface Scheme
Audit Trail Generation and Manipulation
Audit Trail Functionality
Audit Trail Mechanism Overview
Discretionary Access Control
POSIX.1 Permission Bit Mechanism
Access Control Lists
Discretionary Access Algorithm
Discretionary Access Control Interfaces
Application Considerations
Privilege
Super-user and Appropriate Privilege
Privileges and Interfaces Requiring Privilege
Privilege Determination and Privilege Inheritance
Mandatory Access Control
Determining MAC Access
MAC Labeling Mechanism
Information Labels
Information Labeling Mechanism
Interface Descriptions
Protection and Control Utilities
Access Control Lists
Privilege
Mandatory Access Control
Information Labels
Status and Future Work
Standard Cryptographic Service Calls
Background
Overview of Secret-Key and Public-Key Cryptography
John Barkley
Fri Oct 7 16:17:21 EDT 1994