Rationale for Selecting Access Control List Features for the Unix System

Rationale for Selecting Access Control List Features for the Unix System
Author :
Publisher : DIANE Publishing
Total Pages : 88
Release :
ISBN-10 : 078810554X
ISBN-13 : 9780788105548
Rating : 4/5 (548 Downloads)

Book Synopsis Rationale for Selecting Access Control List Features for the Unix System by : Craig Rubin

Download or read book Rationale for Selecting Access Control List Features for the Unix System written by Craig Rubin and published by DIANE Publishing. This book was released on 1989-06 with total page 88 pages. Available in PDF, EPUB and Kindle. Book excerpt: Explores issues in extending the UNIX System discretionary access control (DAC) mechanism. Guidance to vendors and evaluators involved in the development of Trusted Computer System Evaluation Criteria (TCSEC) class B3 trusted UNIX systems. Examples and implementations.


Rationale for Selecting Access Control List Features for the Unix System Related Books

Rationale for Selecting Access Control List Features for the Unix System
Language: en
Pages: 88
Authors: Craig Rubin
Categories: Computers
Type: BOOK - Published: 1989-06 - Publisher: DIANE Publishing

DOWNLOAD EBOOK

Explores issues in extending the UNIX System discretionary access control (DAC) mechanism. Guidance to vendors and evaluators involved in the development of Tru
Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX® System
Language: en
Pages: 88
Rationale for Selecting Access Control List Features for the UNIX System
Language: en
Pages: 72
Authors: National Computer Security Center. Trusted UNIX Working Group
Categories: Computers
Type: BOOK - Published: 1990 - Publisher:

DOWNLOAD EBOOK

Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX® System
Language: en
Pages: 84
Trusted Unix Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the Unix System
Language: en
Pages: 82
Authors:
Categories:
Type: BOOK - Published: 1989 - Publisher:

DOWNLOAD EBOOK

The National Computer Security Center (NCSC) formed the Trusted UNIX Working Group (TRUSIX) in 1987 to provide technical guidance to vendors and evaluators invo