Chapter 7. Security Subsystem

Table of Contents

7.1. Authentication
7.1.1. Linux PAM Example
7.1.2. Kerberos Example
7.1.3. Rehearsal
7.2. Authorization
7.2.1. Activities do Actions on Resources
7.2.2. Levels delimit Security and Integrity
7.2.3. Example: Security Enhanced Linux
7.2.4. Rehearsal
7.3. Security Subsystem Implementation
7.3.1. Example: DoD TCSEC Classification
7.3.2. Example: NIST CCEVS