SELinux by Example: Using Security Enhanced Linux

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

DAC (discretionary access control) 2nd

defined permissions sets,

     file-related object classes

     miscellaneous object classes

     network and socket object classes

     system V IPC-related object classes

destroy permission,

dir command,

dir object class,

dir permissions,

directories, policy,

     filesystem

     installed Boolean files

     security contexts

     user definitions

discretionary access control (DAC) 2nd

Distribute Trusted Mach (DTMach),

doc files, reference policy,

dom (dominates) security levels,

dom operator

     constrain statement

     misconstrain statement

     misvalidatetrans statement

     validatetrans statement

domain transitions

     defaults

     initial policy module

         example policy

         reference policy

     TE (type enforcement)

domain types

     basics

     roles versus user

     strict example policy 2nd

     transitions

domby (dominated by) security levels,

domby operator

     constrain statement

     misconstrain statement

     misvalidatetrans statement

     validatetrans statement

dominance relationships,

dominance statement, 2nd

dominated by (domby) security levels,

dominates (dom) security levels,

dontaudit rule, 2nd

dontaudit statement, conditional statement,

DTMach (Distribute Trusted Mach),

dyntransition permission, 2nd

Категории