Chapter 7. Security Subsystem
Prev
Â
Â
Â
Next
Chapter 7. Security Subsystem
Table of Contents
7.1. Authentication
7.1.1. Linux PAM Example
7.1.2. Kerberos Example
7.1.3. Rehearsal
7.2. Authorization
7.2.1. Activities do Actions on Resources
7.2.2. Levels delimit Security and Integrity
7.2.3. Example: Security Enhanced Linux
7.2.4. Rehearsal
7.3. Security Subsystem Implementation
7.3.1. Example: DoD TCSEC Classification
7.3.2. Example: NIST CCEVS