Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] DAC (discretionary access control) 2nd defined permissions sets, file-related object classes miscellaneous object classes network and socket object classes system V IPC-related object classes destroy permission, dir command, dir object class, dir permissions, directories, policy, filesystem installed Boolean files security contexts user definitions discretionary access control (DAC) 2nd Distribute Trusted Mach (DTMach), doc files, reference policy, dom (dominates) security levels, dom operator constrain statement misconstrain statement misvalidatetrans statement validatetrans statement domain transitions defaults initial policy module example policy reference policy TE (type enforcement) domain types basics roles versus user strict example policy 2nd transitions domby (dominated by) security levels, domby operator constrain statement misconstrain statement misvalidatetrans statement validatetrans statement dominance relationships, dominance statement, 2nd dominated by (domby) security levels, dominates (dom) security levels, dontaudit rule, 2nd dontaudit statement, conditional statement, DTMach (Distribute Trusted Mach), dyntransition permission, 2nd |