Index
Prev
Index
access control
Understanding Access Control
accountability
Why Use a Trusted System
administration, system
documentation
IRIX Admin Manual Set
assurance
Why Use a Trusted System
audit trail
System Audit Trail
System Audit Trail
B1
feature set
Trusted IRIX/CMW Security Features
printing
Data Import/Export Restrictions
tape backup
Data Import/Export Restrictions
categories
Mandatory Sensitivity
changing
to a new label
Changing Your Security Label
classifications
Mandatory Sensitivity
clearance
Mandatory Sensitivity
conventions, typographical
Conventions Used in This Guide
DAC
Discretionary Access Control
changing permissions
Changing Permissions
definition
Discretionary Access Control
Discretionary Access Control
directory permissions
Directory Permissions
Discretionary Access Control
Discretionary Access Control
file permissions
File Permissions
permissions
Discretionary Access Control
POSIX standard
Discretionary Access Control
umask
Setting Permissions with umask
using
Using Discretionary Access Control
definition
of a trusted system
What Is a Trusted System
of label relationships
Label Domination and Equivalence
Discretionary Access Control, see DAC
Discretionary Access Control
divisions
Mandatory Integrity
documentation conventions
Conventions Used in This Guide
domination of labels
Label Domination and Equivalence
equivalence of labels
Label Domination and Equivalence
grades
Mandatory Integrity
help
reference
Reference Pages
importing data
Importing and Exporting Data
IRIX administration
documentation
IRIX Admin Manual Set
IRIX permissions (DAC)
Discretionary Access Control
label
components
Mandatory Access Control
label domination and equivalence
Label Domination and Equivalence
label relationships
sample table
Label Domination and Equivalence
labeling
Mandatory Sensitivity
MAC
changing to a new label
Changing Your Security Label
labeling
Mandatory Sensitivity
permissions
Mandatory Sensitivity
magnetic tape
Magnetic Tape Backups with tar
mail
Mail
man command
Reference Pages
man pages
Reference Pages
mandatory integrity (MINT)
Mandatory Integrity
mandatory sensitivity
Mandatory Sensitivity
MINT
(mandatory integrity)
Mandatory Integrity
divisions
Mandatory Integrity
grades
Mandatory Integrity
mld
Multilevel Directories
moldy directories
Multilevel Directories
MSEN
categories
Mandatory Sensitivity
classifications
Mandatory Sensitivity
clearances
Mandatory Sensitivity
multilevel directories
Multilevel Directories
NCSC
Orange Book
Why Use Trusted IRIX/CMW
TCSEC
Why Use Trusted IRIX/CMW
newlabel(1)
Changing Your Security Label
object reuse
Object Reuse Policy
password
guidelines
Passwords Under Trusted IRIX/CMW
selection
Passwords Under Trusted IRIX/CMW
passwords
generating
Passwords Under Trusted IRIX/CMW
permissions
Mandatory Sensitivity
changing
Changing Permissions
Changing Permissions
directory
Directory Permissions
Directory Permissions
file
File Permissions
File Permissions
umask
Setting Permissions with umask
permissions (DAC)
Discretionary Access Control
printing
security labels
Printing under Trusted IRIX/CMW
running a process at a new label
Changing Your Security Label
sample label relationships
Label Domination and Equivalence
SAT
definition
System Audit Trail
Understanding Auditing
purpose
System Audit Trail
system audit trail
System Audit Trail
security
policy
Why Use a Trusted System
sensitivity
mandatory
Mandatory Sensitivity
sensitivity label
printing
Printing under Trusted IRIX/CMW
support
Better Support
system administration
documentation
IRIX Admin Manual Set
System Audit Trail, see SAT
System Audit Trail
System Audit Trail
tape utilities
Importing and Exporting Data
TCB
Trusted IRIX/CMW Security Features
trust
definition
What Is a Trusted System
Trusted Computing Base
Trusted IRIX/CMW Security Features
typographical conventions
Conventions Used in This Guide
umask
Setting Permissions with umask