T



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

target identifiers, allow (UL) rule,
target SIDs,
target types, allow (UL) rule,
targeted example policies, 2nd
task-based filesystems, file related object labeling,
tcp_socket object class,
tcp_socket permissions,
TE (type enforcement), 2nd
     access control
         domain transitions
         password management program example
         standard Linux SetUID programs
         type transition rule
     access vector rules
         allow rules
         audit rules
         basic syntax 2nd
         neverallow rule
     aliases
     apol
     associating types and attributes
     attributes
     basics
     declaring types
     MLS (multilevel security)
     RBAC (role-based access control)
     security context
         basics
         SELinux versus standard Linux
     type rules
         common syntax
         transition rules
template interfaces, reference policy modularity,
testing
     environment, creating
     policy modules
         additional access testing
         evaluating audit messages
         example policy additional access
         reference policy additional access
togglesebool tool,
transition permission, 2nd
transition rules, user roles,
transition-based filesystems, file related object labeling,
transitions
     constraints, validatetrans statement
     strict example policy
     type rules
         domain defaults
         object default
         type change rules
Tresys Technology
     open source project site
     Web site
trusted subjects,
type enforcement (TE) 2nd
     access control
         domain transitions
         password management program example
         standard Linux SetUID programs
         type transition rule
     access vector rules
         allow rules
         audit rules
         basic syntax 2nd
         neverallow rule
     aliases
     apol
     associating types and attributes
     attributes
     basics
     declaring types
     MLS (multilevel security)
     RBAC (role-based access control)
type enforcement (TE)
     security context
type enforcement (TE)
    security context
         basics
         SELinux versus standard Linux
     type rules
         common syntax
         transition rules
type identifiers, TE (type enforcement),
type negation, AV (access vector) syntax,
type statement,
type transition rule, domain transitions,
type_change statement, conditional statement,
type_member rule,
type_transition statement, conditional statement,
typealias statements,
typeattribute statements,
types
     attributes
     AV (access vector) syntax
     change rule
     creating initial policy module
         example policy
         reference policy
     declaring
     domain 2nd
     rules
         common syntax
         transition rules
     TE (type enforcement)




SELinux by Example(c) Using Security Enhanced Linux
SELinux by Example: Using Security Enhanced Linux
ISBN: 0131963694
EAN: 2147483647
Year: 2007
Pages: 154

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net