From owner-p4-projects Mon May 27 14:12:49 2002 Delivered-To: p4-projects@freebsd.org Received: by hub.freebsd.org (Postfix, from userid 32767) id 2094A37B403; Mon, 27 May 2002 14:12:36 -0700 (PDT) Delivered-To: perforce@freebsd.org Received: from freefall.freebsd.org (freefall.FreeBSD.org [216.136.204.21]) by hub.freebsd.org (Postfix) with ESMTP id 443D737B401 for ; Mon, 27 May 2002 14:12:35 -0700 (PDT) Received: (from perforce@localhost) by freefall.freebsd.org (8.11.6/8.11.6) id g4RLCZY29808 for perforce@freebsd.org; Mon, 27 May 2002 14:12:35 -0700 (PDT) (envelope-from chris@freebsd.org) Date: Mon, 27 May 2002 14:12:35 -0700 (PDT) Message-Id: <200205272112.g4RLCZY29808@freefall.freebsd.org> X-Authentication-Warning: freefall.freebsd.org: perforce set sender to chris@freebsd.org using -f From: Chris Costello Subject: PERFORCE change 11987 for review To: Perforce Change Reviews Sender: owner-p4-projects@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG http://people.freebsd.org/~peter/p4db/chv.cgi?CH=11987 Change 11987 by chris@chris_holly on 2002/05/27 14:11:44 Fix affiliations Remove some redundant language Re-copy in the man page's SEE ALSO section for a more readable citation reference (commented out) Affected files ... ... //depot/projects/trustedbsd/doc/en_US.ISO8859-1/articles/lomac/article.sgml#6 edit Differences ... ==== //depot/projects/trustedbsd/doc/en_US.ISO8859-1/articles/lomac/article.sgml#6 (text+ko) ==== @@ -35,7 +35,12 @@ $FreeBSD$ --> - + +%man +]> +
LOMAC Operations Manual @@ -46,7 +51,9 @@ Tim - + + NAI Labs CBOSS Project + @@ -54,8 +61,9 @@ Chris - + + Safeport Network Services, TrustedBSD Project + @@ -68,7 +76,7 @@ the integrity of processes and data from viruses, Trojan horses, malicious remote users, and compromised root daemons. LOMAC is designed to be - largely invisible to users, and largely painless to + virtually invisible to users, and largely painless to administrators. This is the operations manual for LOMAC. It describes @@ -198,7 +206,6 @@ 2—LOMAC's highest level of privilege. - Look at the levels of your files. (-Z shows levels.) @@ -698,25 +705,33 @@ may be an aid to administration, particularly when downloading and installing new software. - - - SEE ALSO + + - - sec-arch(7), security(7) [BIB77] K. J. Biba, "Integrity - Considerations for Secure Computer Systems," Electronic Systems - Division, Hanscom Air Force Base, Bedford, MA, April 1977, pages - 27-31. [BOE85] W. E. Boebert and R. Y. Kain, "A Practical - Alternative to Hierarchical Integrity Policies," Proceedings of - the 8th National Computer Security Conference, 1985. LWM and - Trust: pages 19-20. Assured Pipelines: pages 20-25. [FRA01] T. - Fraser, "LOMAC: MAC You Can Live With", Proceedings of the - FREENIX Track: USENIX Annual Technical Conference, Boston, - Massachusetts, June, 2001. [SAL75] J. H. Saltzer and M. D. - Schroeder, "The Protection of Information in Computer Systems," - Proceedings of the IEEE Vol. 63(9), September 1975, pages - 1278-1308. Also summarized in Dorothy E. Denning, "Cryptography - and Data Security," Addison-Wesley, 1982, page 206. -
To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe p4-projects" in the body of the message