Back to Results
First PageMeta Content
Software / Time of check to time of use / User identifier / Capability-based security / Setuid / Filesystem permissions / Group identifier / Shadow password / Ptrace / Unix / System software / Computing


View access control as a matrix Specifying policy • Manually filling out matrix would be tedious • Use tools such as groups or role-based access control:
Add to Reading List

Document Date: 2010-03-04 18:26:58


Open Document

File Size: 193,47 KB

Share Result on Facebook

City

User / /

Facility

Single-level store / TCP port / Server port / UDP port / /

IndustryTerm

unmount file systems / file server / user group other owner / application software / file / /

OperatingSystem

Hydra / Unix / KeyKOS / OpenBSD / Linux / /

/

Position

Author / Driver Domain Device Driver Domain Device Driver / /

ProgrammingLanguage

Java / /

Technology

private key / secret key / UDP / html / Java / Linux / Unix / X windows / /

SocialTag