POSIX Security Interfaces and Mechanisms
Next:
Introduction to POSIX
Up:
Operating System Services
Previous:
Operating System Services
POSIX Security Interfaces and Mechanisms
Lisa Carnahan
Introduction to POSIX Security
Posix Security Functionality
FIPS 151-2 Security Mechanisms and Interfaces (P1003.1)
Data Structures and the Interface Scheme
Audit Trail Generation and Manipulation
Audit Trail Functionality
Audit Trail Mechanism Overview
Discretionary Access Control
POSIX.1 Permission Bit Mechanism
Access Control Lists
Discretionary Access Algorithm
Discretionary Access Control Interfaces
Application Considerations
Privilege
Super-user and Appropriate Privilege
Privileges and Interfaces Requiring Privilege
Privilege Determination and Privilege Inheritance
Mandatory Access Control
Determining MAC Access
MAC Labeling Mechanism
Information Labels
Information Labeling Mechanism
Interface Descriptions
Protection and Control Utilities
Access Control Lists
Privilege
Mandatory Access Control
Information Labels
Status and Future Work
John Barkley
Fri Oct 7 16:17:21 EDT 1994