http://dbpedia.org/ontology/abstract
|
Unter Type Enforcement versteht man eine Form der Implementierung eines MAC-Systems. Hierbei werden bei der Definition der Zugriffsregeln nicht die zu schützenden Ressourcen selbst, sondern ein Typ, der diesen zugewiesen wurde, angegeben.
, The concept of type enforcement (TE), in t … The concept of type enforcement (TE), in the field of information technology, is an access control mechanism for regulating access in computer systems. Implementing TE gives priority to mandatory access control (MAC) over discretionary access control (DAC). Access clearance is first given to a subject (e.g. process) accessing objects (e.g. files, records, messages) based on rules defined in an attached . A security context in a domain is defined by a domain security policy. In the Linux security module (LSM) in SELinux, the security context is an extended attribute. Type enforcement implementation is a prerequisite for MAC, and a first step before multilevel security (MLS) or its replacement multi categories security (MCS). It is a complement of role-based access control (RBAC).ement of role-based access control (RBAC).
|
http://dbpedia.org/ontology/wikiPageExternalLink
|
http://csrc.nist.gov/nissc/1998/proceedings/paperF1.pdf +
, http://cryptosmith.com/mls/lock/ +
, http://citeseer.ist.psu.edu/viewdoc/download%3Fdoi=10.1.1.37.1501&rep=rep1&type=pdf +
, http://citeseer.ist.psu.edu/viewdoc/summary%3Fdoi=10.1.1.37.1501 +
, https://web.archive.org/web/20070621155813/http:/jya.com/paperF1.htm +
|
http://dbpedia.org/ontology/wikiPageID
|
3771867
|
http://dbpedia.org/ontology/wikiPageLength
|
4751
|
http://dbpedia.org/ontology/wikiPageRevisionID
|
1067865240
|
http://dbpedia.org/ontology/wikiPageWikiLink
|
http://dbpedia.org/resource/Information_technology +
, http://dbpedia.org/resource/FLASK +
, http://dbpedia.org/resource/Multilevel_security +
, http://dbpedia.org/resource/SELinux +
, http://dbpedia.org/resource/Authorization_scheme +
, http://dbpedia.org/resource/Category:Operating_system_security +
, http://dbpedia.org/resource/Microsoft +
, http://dbpedia.org/resource/Category:Computer_security_models +
, http://dbpedia.org/resource/Domain_transition +
, http://dbpedia.org/resource/Discretionary_access_control +
, http://dbpedia.org/resource/Active_Directory +
, http://dbpedia.org/resource/Trusted_MACH +
, http://dbpedia.org/resource/Security_context +
, http://dbpedia.org/resource/Sidewinder_Internet_Firewall +
, http://dbpedia.org/resource/Multi_categories_security +
, http://dbpedia.org/resource/Mandatory_access_control +
, http://dbpedia.org/resource/Secure_Ada_Target +
, http://dbpedia.org/resource/Role-based_access_control +
, http://dbpedia.org/resource/Linux_Security_Modules +
|
http://dbpedia.org/property/wikiPageUsesTemplate
|
http://dbpedia.org/resource/Template:More_citations_needed +
, http://dbpedia.org/resource/Template:Multiple_issues +
, http://dbpedia.org/resource/Template:Context +
, http://dbpedia.org/resource/Template:Reflist +
|
http://purl.org/dc/terms/subject
|
http://dbpedia.org/resource/Category:Operating_system_security +
, http://dbpedia.org/resource/Category:Computer_security_models +
|
http://www.w3.org/ns/prov#wasDerivedFrom
|
http://en.wikipedia.org/wiki/Type_enforcement?oldid=1067865240&ns=0 +
|
http://xmlns.com/foaf/0.1/isPrimaryTopicOf
|
http://en.wikipedia.org/wiki/Type_enforcement +
|
owl:sameAs |
http://de.dbpedia.org/resource/Type_Enforcement +
, http://www.wikidata.org/entity/Q2463060 +
, http://yago-knowledge.org/resource/Type_enforcement +
, http://rdf.freebase.com/ns/m.09_4sx +
, https://global.dbpedia.org/id/2KQBf +
, http://dbpedia.org/resource/Type_enforcement +
|
rdf:type |
http://dbpedia.org/class/yago/LivingThing100004258 +
, http://dbpedia.org/class/yago/YagoLegalActorGeo +
, http://dbpedia.org/class/yago/YagoLegalActor +
, http://dbpedia.org/class/yago/Organism100004475 +
, http://dbpedia.org/class/yago/Person100007846 +
, http://dbpedia.org/class/yago/WikicatComputerSecurityModels +
, http://dbpedia.org/class/yago/PhysicalEntity100001930 +
, http://dbpedia.org/class/yago/Worker109632518 +
, http://dbpedia.org/class/yago/Whole100003553 +
, http://dbpedia.org/class/yago/CausalAgent100007347 +
, http://dbpedia.org/class/yago/Assistant109815790 +
, http://dbpedia.org/class/yago/Object100002684 +
, http://dbpedia.org/class/yago/Model110324560 +
|
rdfs:comment |
Unter Type Enforcement versteht man eine Form der Implementierung eines MAC-Systems. Hierbei werden bei der Definition der Zugriffsregeln nicht die zu schützenden Ressourcen selbst, sondern ein Typ, der diesen zugewiesen wurde, angegeben.
, The concept of type enforcement (TE), in t … The concept of type enforcement (TE), in the field of information technology, is an access control mechanism for regulating access in computer systems. Implementing TE gives priority to mandatory access control (MAC) over discretionary access control (DAC). Access clearance is first given to a subject (e.g. process) accessing objects (e.g. files, records, messages) based on rules defined in an attached . A security context in a domain is defined by a domain security policy. In the Linux security module (LSM) in SELinux, the security context is an extended attribute. Type enforcement implementation is a prerequisite for MAC, and a first step before multilevel security (MLS) or its replacement multi categories security (MCS). It is a complement of role-based access control (RBAC).ement of role-based access control (RBAC).
|
rdfs:label |
Type Enforcement
, Type enforcement
|