D



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

DAC (discretionary access control) 2nd
defined permissions sets,
     file-related object classes
     miscellaneous object classes
     network and socket object classes
     system V IPC-related object classes
destroy permission,
dir command,
dir object class,
dir permissions,
directories, policy,
     filesystem
     installed Boolean files
     security contexts
     user definitions
discretionary access control (DAC) 2nd
Distribute Trusted Mach (DTMach),
doc files, reference policy,
dom (dominates) security levels,
dom operator
     constrain statement
     misconstrain statement
     misvalidatetrans statement
     validatetrans statement
domain transitions
     defaults
     initial policy module
         example policy
         reference policy
     TE (type enforcement)
domain types
     basics
     roles versus user
     strict example policy 2nd
     transitions
domby (dominated by) security levels,
domby operator
     constrain statement
     misconstrain statement
     misvalidatetrans statement
     validatetrans statement
dominance relationships,
dominance statement, 2nd
dominated by (domby) security levels,
dominates (dom) security levels,
dontaudit rule, 2nd
dontaudit statement, conditional statement,
DTMach (Distribute Trusted Mach),
dyntransition permission, 2nd




SELinux by Example(c) Using Security Enhanced Linux
SELinux by Example: Using Security Enhanced Linux
ISBN: 0131963694
EAN: 2147483647
Year: 2007
Pages: 154

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net