The
RSBAC
library
Prev
Next
I. RSBAC theory
The first part of this book describes the theory behind
RSBAC
.
Table of Contents
1.
Introduction
1.1.
Introduction
2.
RSBAC Models
2.1.
Mandatory Access Control (MAC)
2.1.1.
Bell-La Padula
2.1.2.
Unix System V/MLS
2.1.3.
The
RSBAC
MAC
implementation
2.2.
Functional Control (
FC
)
2.3.
Security Information Modification (SIM)
2.4.
Simone Fischer-Huebner's Privacy Model (
PM
)
2.5.
Malware Scan (
MS
)
2.6.
File Flags (
FF
)
2.7.
Role Compatibility (
RC
)
2.7.1.
Role Compatibility (
RC
) - Until v1.0.9-pre3
2.7.2.
Role Compatibility (
RC
) - From v1.0.9-pre4 onwards
2.8.
Authentification Module (
AUTH
)
2.8.1.
Basics
2.8.2.
AUTH
attributes
2.8.3.
Special Values
2.8.4.
Initial Configuration
2.8.5.
Administration
2.8.6.
When to use AUTH model
2.9.
Access Control Lists Module (
ACL
)
2.9.1.
Basics
2.9.2.
Time limits (from 1.2.0 onwards)
2.9.3.
When to use ACL model
2.10.
Linux Capabilities (
CAP
)
2.10.1.
Basics
2.10.2.
When to use CAP model
2.11.
JAIL
2.11.1.
Basics
2.11.2.
When to use
JAIL
module
3.
RSBAC Targets and requests
3.1.
Targets
3.2.
Requests
Prev
Home
Next
Preface
Up
Introduction