index_T

     
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

tape_device_t type
targets (operations) supported by Makefile 2nd
tcp_recv operation
tcp_send operation
tcp_socket (object security class) 2nd
tcp_socket_t type
TCSEC (Trusted Computer System Evaluation Criteria)
TE (type enforcement) declarations
        te_rbac policy element
TE (type enforcement) files
        avoiding modification of existing files
        creating 2nd
        manual installation by system administrators
        role type declarations and
        testing/revising
        troubleshooting
        understanding how SELinux policy operates
TE (type enforcement) model 2nd
TE access-vector declarations (te_avtab_def)
TE Rules tab (Apol window)
te_rbac policy element 2nd
        TE and RBAC declarations
Test Policy tab (Sepcut window)
test_file_t type
tetex_data_t type
Thompson, Kerry
threats to the Internet
        active content contributing to
        mobile code contributing to
        network connectivity contributing to
        software complexity contributing to
tmp subdirectory 2nd
tmp_domain macro
tmp_t type
tmpfile type attribute
tmpfs (pseudofilesystem with memory-resident filesystem)
tmpfs_domain macro
tmpfs_t type
tmpfsfile type attribute
tokens in regular expressions
tools in SELinux
traceroute command, controlling access to
traceroute_t domain
       authorizing access
                to entire domain
                to pseudoterminals
                using macros
        examining FC file for
transient objects
transition decisions 2nd
transition declarations (transition_def)
transition operation
transition_sid operation
transitioning to new domains 2nd
transitions
        authorizing, with access-vector rules
        between roles, governed by allow statements 2nd
        specifying, with type-transition rules
transitive information flow analysis
Tresys Technology
        Apol tool
        policy management tools
        Seaudit tool
        Sepcut tool
        Seuserx tool
        tools provided by
troubleshooting SELinux
        boot problems 2nd
        daemon problems
        local login problems
        program execution problems
        X problems
Trusted Computer System Evaluation Criteria (TCSEC)
TrustedBSD
tty_device_t type
ttyfile type attribute 2nd
tun_tap_device_t type
tunable.te file 2nd
        enabling/disabling direct_sysadm_daemon macro
        enabling/disabling user_canbe_sysadm macro
        macros defined in
tuning
        Fedora Core 2 SELinux
                via macros
                via policy Booleans
type attributes
        creating/modifying 2nd
        in Fedora Core 2 SELinux 2nd
type declarations (type_def)
type enforcement (TE) declarations
        te_rbac policy element
type enforcement (TE) model 2nd
type enforcement files files [See TE (type enforcement]
type line in snort.te file
type tokens in regular expressions
type transitions
        authorizing automatic
        rules for specifying transitions
        syntax of
type-alias declarations (typealias_def)
types in SELinux 2nd
        device- related
        file-related
        networking
        /proc-related
types subdirectory 2nd
        files in
Types tab (Apol window)
types, special notations for
types.fc file 2nd

 


SELinux. NSA's Open Source Security Enhanced Linux
Selinux: NSAs Open Source Security Enhanced Linux
ISBN: 0596007167
EAN: 2147483647
Year: 2003
Pages: 100
Authors: Bill McCarty

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net