SELinux by Example: Using Security Enhanced Linux

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

identifiers, users,

     declaring

     mapping Linux users to SELinux users

ifdef statement,

incomp (incomparable) security level,

incomp operator

     constrain statement

     misconstrain statement

     misvalidatetrans statement

     validatetrans statement

initial policy module, writing

     allowing initial restrictive access

     creating files

     creating labeling policy

     declaring types

     domain transitions

     integrating into system policy

     policy application

initial security identifiers, object labeling,

initial SIDs

     object labeling 2nd

     statements

install command,

interfaces, reference policy modularity,

     access interface

     template interface

interprocess communication (IPC), 2nd

ioctl permission, 2nd

IP Security (IPsec),

IPC (interprocess communication), 2nd

ipc common permission sets,

ipc object class,

ipc permissions,

IPC-related object classes,

Ipsec (IP Security),

IRC channel, SELinux,

IRC daemon modules, listings,

Категории