Check out the new USENIX Web site.
... types 1
This hierarchy is generated by the transition permissions held by each of these subject types.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... program 2
Of course, the use of so many root services gives has given a false impression of the integrity of many programs.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... constraint 3
Details are beyond the scope of this paper. See the detailed Gokyo writeup [13].
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... statements 4
Statement count is taken from the macroexpanded policy in policy.conf.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Trent Jaeger
2003-05-11