Index

access control
Understanding Access Control

accountability
Why Use a Trusted System

administration, system
documentation
IRIX Admin Manual Set

assurance
Why Use a Trusted System

audit trail
System Audit Trail
System Audit Trail

B1
feature set
Trusted IRIX/CMW Security Features
printing
Data Import/Export Restrictions
tape backup
Data Import/Export Restrictions

categories
Mandatory Sensitivity

changing
to a new label
Changing Your Security Label

classifications
Mandatory Sensitivity

clearance
Mandatory Sensitivity

conventions, typographical
Conventions Used in This Guide

DAC
Discretionary Access Control
changing permissions
Changing Permissions
definition
Discretionary Access Control
Discretionary Access Control
directory permissions
Directory Permissions
Discretionary Access Control
Discretionary Access Control
file permissions
File Permissions
permissions
Discretionary Access Control
POSIX standard
Discretionary Access Control
umask
Setting Permissions with umask
using
Using Discretionary Access Control

definition
of a trusted system
What Is a Trusted System
of label relationships
Label Domination and Equivalence

Discretionary Access Control, see DAC
Discretionary Access Control

divisions
Mandatory Integrity

documentation conventions
Conventions Used in This Guide

domination of labels
Label Domination and Equivalence

equivalence of labels
Label Domination and Equivalence

grades
Mandatory Integrity

help
reference
Reference Pages

importing data
Importing and Exporting Data

IRIX administration
documentation
IRIX Admin Manual Set

IRIX permissions (DAC)
Discretionary Access Control

label
components
Mandatory Access Control

label domination and equivalence
Label Domination and Equivalence

label relationships
sample table
Label Domination and Equivalence

labeling
Mandatory Sensitivity

MAC
changing to a new label
Changing Your Security Label
labeling
Mandatory Sensitivity
permissions
Mandatory Sensitivity

magnetic tape
Magnetic Tape Backups with tar

mail
Mail

man command
Reference Pages

man pages
Reference Pages

mandatory integrity (MINT)
Mandatory Integrity

mandatory sensitivity
Mandatory Sensitivity

MINT
(mandatory integrity)
Mandatory Integrity
divisions
Mandatory Integrity
grades
Mandatory Integrity

mld
Multilevel Directories

moldy directories
Multilevel Directories

MSEN
categories
Mandatory Sensitivity
classifications
Mandatory Sensitivity
clearances
Mandatory Sensitivity

multilevel directories
Multilevel Directories

NCSC
Orange Book
Why Use Trusted IRIX/CMW
TCSEC
Why Use Trusted IRIX/CMW

newlabel(1)
Changing Your Security Label

object reuse
Object Reuse Policy

password
guidelines
Passwords Under Trusted IRIX/CMW
selection
Passwords Under Trusted IRIX/CMW

passwords
generating
Passwords Under Trusted IRIX/CMW

permissions
Mandatory Sensitivity
changing
Changing Permissions
Changing Permissions
directory
Directory Permissions
Directory Permissions
file
File Permissions
File Permissions
umask
Setting Permissions with umask

permissions (DAC)
Discretionary Access Control

printing
security labels
Printing under Trusted IRIX/CMW

running a process at a new label
Changing Your Security Label

sample label relationships
Label Domination and Equivalence

SAT
definition
System Audit Trail
Understanding Auditing
purpose
System Audit Trail
system audit trail
System Audit Trail

security
policy
Why Use a Trusted System

sensitivity
mandatory
Mandatory Sensitivity

sensitivity label
printing
Printing under Trusted IRIX/CMW

support
Better Support

system administration
documentation
IRIX Admin Manual Set

System Audit Trail, see SAT
System Audit Trail
System Audit Trail

tape utilities
Importing and Exporting Data

TCB
Trusted IRIX/CMW Security Features

trust
definition
What Is a Trusted System

Trusted Computing Base
Trusted IRIX/CMW Security Features

typographical conventions
Conventions Used in This Guide

umask
Setting Permissions with umask