Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 27 May 2002 14:12:35 -0700 (PDT)
From:      Chris Costello <chris@FreeBSD.org>
To:        Perforce Change Reviews <perforce@freebsd.org>
Subject:   PERFORCE change 11987 for review
Message-ID:  <200205272112.g4RLCZY29808@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
http://people.freebsd.org/~peter/p4db/chv.cgi?CH=11987

Change 11987 by chris@chris_holly on 2002/05/27 14:11:44

	Fix affiliations
	Remove some redundant language
	Re-copy in the man page's SEE ALSO section for a more readable
	citation reference (commented out)

Affected files ...

... //depot/projects/trustedbsd/doc/en_US.ISO8859-1/articles/lomac/article.sgml#6 edit

Differences ...

==== //depot/projects/trustedbsd/doc/en_US.ISO8859-1/articles/lomac/article.sgml#6 (text+ko) ====

@@ -35,7 +35,12 @@
      $FreeBSD$
 -->
 
-<!DOCTYPE article PUBLIC "-//FreeBSD//DTD DocBook V4.1-Based Extension//EN">
+<!DOCTYPE article PUBLIC "-//FreeBSD//DTD DocBook V4.1-Based Extension//EN" [
+
+<!ENTITY % man PUBLIC "-//FreeBSD//ENTITIES DocBook Manual Page Entities//EN">
+%man
+]>
+
 <article>
   <articleinfo>
     <title>LOMAC Operations Manual</title>
@@ -46,7 +51,9 @@
         
         <firstname>Tim</firstname>
         
-        <!-- affiliation-NAI Labs CBOSS Project-/affiliation -->
+        <affiliation>
+          <orgname>NAI Labs CBOSS Project</orgname>
+        </affiliation>
       </author>
       
       <author>
@@ -54,8 +61,9 @@
         
         <firstname>Chris</firstname>
         
-        <!-- affiliation-Safeport Network Services, NAI Labs CBOSS
-        Project</affiliation -->
+        <affiliation>
+          <orgname>Safeport Network Services, TrustedBSD Project</orgname>
+        </affiliation>
       </author>
     </authorgroup>
     
@@ -68,7 +76,7 @@
         the integrity of processes and data from viruses, Trojan
         horses, malicious remote users, and compromised
         <username>root</username> daemons. LOMAC is designed to be
-        largely invisible to users, and largely painless to
+        virtually invisible to users, and largely painless to
         administrators.</para>
       
       <para>This is the operations manual for LOMAC. It describes
@@ -198,7 +206,6 @@
           2&mdash;LOMAC's highest level of privilege.</para>
       </listitem>
       
-      <!-- XXX -->
       <listitem>
         <para>Look at the levels of your files. (<literal>-Z</literal>
           shows levels.)</para>
@@ -698,25 +705,33 @@
       may be an aid to administration, particularly when downloading
       and installing new software.</para>
   </sect1>
-  
-  <sect1>
-    <title>SEE ALSO</title>
+
+<!--
+SEE ALSO
+     sec-arch(7), security(7)
+
+     [BIB77] K. J. Biba, "Integrity Considerations for Secure Computer Sys-
+             tems," Electronic Systems Division, Hanscom Air Force Base, Bed-
+             ford, MA, April 1977, pages 27-31.
+
+     [BOE85] W. E. Boebert and R. Y. Kain, "A Practical Alternative to Hierar-
+             chical Integrity Policies," Proceedings of the 8th National Com-
+             puter Security Conference, 1985.  LWM and Trust: pages 19-20.
+             Assured Pipelines: pages 20-25.
+     [FRA00] T. Fraser "LOMAC: Low Water-Mark Integrity Protection for COTS
+             Environments", Proceedings of the 2000 IEEE Symposium on Security
+             and Privacy, 2000.
+
+     [FRA01] T. Fraser, "LOMAC: MAC You Can Live With", Proceedings of the
+             FREENIX Track: USENIX Annual Technical Conference, Boston, Mas-
+             sachusetts, June, 2001.
+
+     [SAL75] J. H. Saltzer and M. D. Schroeder, "The Protection of Information
+             in Computer Systems," Proceedings of the IEEE Vol. 63(9), Septem-
+             ber 1975, pages 1278-1308.  Also summarized in Dorothy E. Den-
+             ning, "Cryptography and Data Security," Addison-Wesley, 1982,
+             page 206.
+-->
 
-    <!-- XXX -->
-    <para>sec-arch(7), security(7) [BIB77] K. J. Biba, "Integrity
-      Considerations for Secure Computer Systems," Electronic Systems
-      Division, Hanscom Air Force Base, Bedford, MA, April 1977, pages
-      27-31. [BOE85] W. E. Boebert and R. Y. Kain, "A Practical
-      Alternative to Hierarchical Integrity Policies," Proceedings of
-      the 8th National Computer Security Conference, 1985. LWM and
-      Trust: pages 19-20. Assured Pipelines: pages 20-25. [FRA01] T.
-      Fraser, "LOMAC: MAC You Can Live With", Proceedings of the
-      FREENIX Track: USENIX Annual Technical Conference, Boston,
-      Massachusetts, June, 2001. [SAL75] J. H. Saltzer and M. D.
-      Schroeder, "The Protection of Information in Computer Systems,"
-      Proceedings of the IEEE Vol. 63(9), September 1975, pages
-      1278-1308. Also summarized in Dorothy E. Denning, "Cryptography
-      and Data Security," Addison-Wesley, 1982, page 206.</para>
-  </sect1>
 </article>
 

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe p4-projects" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200205272112.g4RLCZY29808>