Next:
Introduction
Up:
LIDS 2.0 Specifications Version
Previous:
Contents
 
Contents
General concepts
Subsections
Introduction
Inside the box
Needs
Comparison with previous LIDS
A new security model
Adopted approach
Privileges and permissions
Filesystem permissions
Privileges
Insight into the set of rights
Enhancing rights mapping
Gathering files
Gathering rights
Biondi Philippe 2000-12-15