Check out the new USENIX Web site. next up previous
Next: execve Up: Enhancements to the Linux Previous: The Access Control Database

   
The reference functions

This section presents some examples of the extensions introduced to control the system calls defined in section 2.2 as threat level 1.



 


2000-08-22