R



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

rawip_socket object class,
rawip_socket permissions,
RBAC (role-based access control) 2nd
     basics
     privilege management
read permission, 2nd
recv_mesg permission,
recvfrom permission,
Red Hat Enterprise Linux 4 (RHEL4)
     example policy support
     target policy
Red Hat Fedora Core 5, reference policy,
Red Hat, Fedora Core Web site,
reference monitors, operating system access control,
reference policies
     adding additional access
     allowing initial restrictive access
    build options
         build.conf file
         modules.conf file
     creating labeling policy
     declaring types
    design principles
         layering
         modularity
     domain transitions
    file structure
         build and support files
         core policy files
     goals
     initial policy module
     module example
     obtaining
         Red Hat Fedora Core 5
         Tresys Technology open source project site
     system policy integration with initial policy
reference validation mechanisms,
Reinhold, Van Nostran, Building a Secure Computer System,
relabelfrom permission, 2nd
relabelto permission, 2nd
rename permission, 2nd
require statements,
resources
     Hardened Gentoo
     NSA (National Security Agency)
     open source projects
     Red Hat Fedora Core site
     related security information
     SELinux IRC channel
     SELinux mailing list
     SELinux symposium
     Tresys Technology
restorecon tool,
restrictions, MLS (multilevel security),
restrictive access, initial policy module,
     example policy
     reference policy
revocation, access,
RHEL4 (Red Hat Enterprise Linux 4)
     example policy support
     target policy
rlimitnh permission,
role allow rules, 2nd
role declaration statement, 2nd
role dominance statement,
role transition rules,
role-based access control (RBAC), 2nd
     basics
     privilege management
roles
    users
         apol
         identifiers
         RBAC (role-based access control)
         role allow rule
         role declaration statement
         role dominance statement
         transition rules
     versus user domain types
rule lists, conditional statement,
rules, TE (type enforcement)
     access vector rules
     aliases
     apol
     associating types and attributes
     attributes
     basics
     declaring types
     type rules
Rules.modular files, reference policy,
run_init tool,
runcon tool,
runtime conditionals,




SELinux by Example(c) Using Security Enhanced Linux
SELinux by Example: Using Security Enhanced Linux
ISBN: 0131963694
EAN: 2147483647
Year: 2007
Pages: 154

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net