Contents
1.1 The Inevitability of Software Failure
1.2 The Evolution of Access Control Security in Operating Systems
1.2.1 The Reference Monitor Concept
1.2.2 The Problem with Discretionary Access Control
1.2.3 The Origins of Mandatory Access Control
1.2.4 A Better Form of Mandatory Access Control
1.2.5 The Evolution of SELinux
2.1 Security Contexts for Type Enforcement
2.1.1 Comparing SELinux with Standard Linux
2.1.2 More on Security Contexts
2.2 Type Enforcement Access Control
2.2.1 Type Enforcement by Example
2.2.2 The Problem of Domain Transitions
Get SELinux by Example: Using Security Enhanced Linux now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.