Date: Mon, 27 May 2002 14:12:35 -0700 (PDT) From: Chris Costello <chris@FreeBSD.org> To: Perforce Change Reviews <perforce@freebsd.org> Subject: PERFORCE change 11987 for review Message-ID: <200205272112.g4RLCZY29808@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
http://people.freebsd.org/~peter/p4db/chv.cgi?CH=11987 Change 11987 by chris@chris_holly on 2002/05/27 14:11:44 Fix affiliations Remove some redundant language Re-copy in the man page's SEE ALSO section for a more readable citation reference (commented out) Affected files ... ... //depot/projects/trustedbsd/doc/en_US.ISO8859-1/articles/lomac/article.sgml#6 edit Differences ... ==== //depot/projects/trustedbsd/doc/en_US.ISO8859-1/articles/lomac/article.sgml#6 (text+ko) ==== @@ -35,7 +35,12 @@ $FreeBSD$ --> -<!DOCTYPE article PUBLIC "-//FreeBSD//DTD DocBook V4.1-Based Extension//EN"> +<!DOCTYPE article PUBLIC "-//FreeBSD//DTD DocBook V4.1-Based Extension//EN" [ + +<!ENTITY % man PUBLIC "-//FreeBSD//ENTITIES DocBook Manual Page Entities//EN"> +%man +]> + <article> <articleinfo> <title>LOMAC Operations Manual</title> @@ -46,7 +51,9 @@ <firstname>Tim</firstname> - <!-- affiliation-NAI Labs CBOSS Project-/affiliation --> + <affiliation> + <orgname>NAI Labs CBOSS Project</orgname> + </affiliation> </author> <author> @@ -54,8 +61,9 @@ <firstname>Chris</firstname> - <!-- affiliation-Safeport Network Services, NAI Labs CBOSS - Project</affiliation --> + <affiliation> + <orgname>Safeport Network Services, TrustedBSD Project</orgname> + </affiliation> </author> </authorgroup> @@ -68,7 +76,7 @@ the integrity of processes and data from viruses, Trojan horses, malicious remote users, and compromised <username>root</username> daemons. LOMAC is designed to be - largely invisible to users, and largely painless to + virtually invisible to users, and largely painless to administrators.</para> <para>This is the operations manual for LOMAC. It describes @@ -198,7 +206,6 @@ 2—LOMAC's highest level of privilege.</para> </listitem> - <!-- XXX --> <listitem> <para>Look at the levels of your files. (<literal>-Z</literal> shows levels.)</para> @@ -698,25 +705,33 @@ may be an aid to administration, particularly when downloading and installing new software.</para> </sect1> - - <sect1> - <title>SEE ALSO</title> + +<!-- +SEE ALSO + sec-arch(7), security(7) + + [BIB77] K. J. Biba, "Integrity Considerations for Secure Computer Sys- + tems," Electronic Systems Division, Hanscom Air Force Base, Bed- + ford, MA, April 1977, pages 27-31. + + [BOE85] W. E. Boebert and R. Y. Kain, "A Practical Alternative to Hierar- + chical Integrity Policies," Proceedings of the 8th National Com- + puter Security Conference, 1985. LWM and Trust: pages 19-20. + Assured Pipelines: pages 20-25. + [FRA00] T. Fraser "LOMAC: Low Water-Mark Integrity Protection for COTS + Environments", Proceedings of the 2000 IEEE Symposium on Security + and Privacy, 2000. + + [FRA01] T. Fraser, "LOMAC: MAC You Can Live With", Proceedings of the + FREENIX Track: USENIX Annual Technical Conference, Boston, Mas- + sachusetts, June, 2001. + + [SAL75] J. H. Saltzer and M. D. Schroeder, "The Protection of Information + in Computer Systems," Proceedings of the IEEE Vol. 63(9), Septem- + ber 1975, pages 1278-1308. Also summarized in Dorothy E. Den- + ning, "Cryptography and Data Security," Addison-Wesley, 1982, + page 206. +--> - <!-- XXX --> - <para>sec-arch(7), security(7) [BIB77] K. J. Biba, "Integrity - Considerations for Secure Computer Systems," Electronic Systems - Division, Hanscom Air Force Base, Bedford, MA, April 1977, pages - 27-31. [BOE85] W. E. Boebert and R. Y. Kain, "A Practical - Alternative to Hierarchical Integrity Policies," Proceedings of - the 8th National Computer Security Conference, 1985. LWM and - Trust: pages 19-20. Assured Pipelines: pages 20-25. [FRA01] T. - Fraser, "LOMAC: MAC You Can Live With", Proceedings of the - FREENIX Track: USENIX Annual Technical Conference, Boston, - Massachusetts, June, 2001. [SAL75] J. H. Saltzer and M. D. - Schroeder, "The Protection of Information in Computer Systems," - Proceedings of the IEEE Vol. 63(9), September 1975, pages - 1278-1308. Also summarized in Dorothy E. Denning, "Cryptography - and Data Security," Addison-Wesley, 1982, page 206.</para> - </sect1> </article> To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe p4-projects" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200205272112.g4RLCZY29808>