NSA Security-enhanced Linux

Table of Contents

1. Types of AC
2. In general
3. DAC
4. MAC
5. Linux AC
6. SElinux AC
7. DTE model
8. SELinux TE
9. Access modes
10. Type declaration
11. AV rules
12. Transitions
13. Change rules
14. Assertions
15. RBAC model
16. SELinux RBAC
17. MLS model
18. SELinux MLS
19. FLASK
20. Initial SIDs
21. Constraints
22. SecDecs
23. XML
24. XSL
25. SELinux
26. Medusa DS9
27. Conclusion
28. References
29. Q & A