E



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

emergency policy development tools,
encapsulation, reference policy modularity,
entrypoint (UL) permission,
entrypoint accesses,
entrypoint permission, 2nd
eq (equals) security levels,
eq operator
     constrain statement
     misconstrain statement
     misvalidatetrans statement
     validatetrans statement
equals (eq) security levels,
etc/selinux/config files, system management,
example policies
     adding additional access
     build processes methods
     creating labeling policy
     declaring types
     domain transitions
     initial policy module
     obtaining
         historical policies
         recent patches
         RHEL4 (Red Hat Enterprise Linux 4)
         strict example policy for FC4
     strict example policy
         build options
         policy module
         source file structure
     system policy integration with initial policy
     targeted example policy
examply policy, allowing initial restrictive access,
execheap permission,
execmem permission,
execmod* permission,
execstack permission,
execute permission, 2nd 3rd
execute_no_trans* permission,
expressions, conditional statement,
extended attribute mechanisms, file-related object labeling,
     labeling behavior
     managing security contexts




SELinux by Example(c) Using Security Enhanced Linux
SELinux by Example: Using Security Enhanced Linux
ISBN: 0131963694
EAN: 2147483647
Year: 2007
Pages: 154

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net