I



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

identifiers, users,
     declaring
     mapping Linux users to SELinux users
ifdef statement,
incomp (incomparable) security level,
incomp operator
     constrain statement
     misconstrain statement
     misvalidatetrans statement
     validatetrans statement
initial policy module, writing
     allowing initial restrictive access
     creating files
     creating labeling policy
     declaring types
     domain transitions
     integrating into system policy
     policy application
initial security identifiers, object labeling,
initial SIDs
     object labeling 2nd
     statements
install command,
interfaces, reference policy modularity,
     access interface
     template interface
interprocess communication (IPC), 2nd
ioctl permission, 2nd
IP Security (IPsec),
IPC (interprocess communication), 2nd
ipc common permission sets,
ipc object class,
ipc permissions,
IPC-related object classes,
Ipsec (IP Security),
IRC channel, SELinux,
IRC daemon modules, listings,




SELinux by Example(c) Using Security Enhanced Linux
SELinux by Example: Using Security Enhanced Linux
ISBN: 0131963694
EAN: 2147483647
Year: 2007
Pages: 154

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net