NSA Security-enhanced Linux
Types of AC
In general
DAC
MAC
Linux AC
SElinux AC
DTE model
RBAC model
MLS model
FLASK
SecDecs
Conclusion
In general
Subject and objects have security attributes
Access determined based on policy rules
Copyright © 2004 Pavol Lupták