SELinux by Example: Using Security Enhanced Linux

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

MAC (mandatory access control),

     origins

     TE (type enforcement)

mail lists

     LSM (Linux Security Module)

     SELinux

mandatory access control (MAC),

     origins

     TE (type enforcement)

manual pages, policy modules,

mapping, Linux users to SELinux users,

matchpathcon tool,

MCS (multicategory security),

methods

     policy build process

     strict example policy

         build options

         policy module

         source file structure

     targeted example policy

miscellaneous object classes, defined permissions sets,

miscontrain statement,

misvalidatetrans statement,

MITRE Corporation Web, site

mkdir command,

MLS (multilevel security) 2nd 3rd

    constraints

         misconstrain statement

         misvalidatetrans statement

     impacts

     restrictions

     security contexts

         defining security levels

         extensions

     TE (type enforcement)

modularity reference policy design,

     encapsulation

     interfaces

     module files

module files, reference policy modularity,

module manual pages,

modules, loadable dependency handling,

modules.conf files, reference policy,

monolithic policies,

mounton permission, 2nd

mountpoint labels,

msg object class,

msg permissions,

msgq object class,

msgq permissions,

multicategory security (MCS),

multilevel security [See MLS (multilevel security).]

multiple policies, management,

multiple types, AV (access vector) syntax,

Категории