Skip to main content

Trust in Cyberspace (1999) / Chapter Skim
Currently Skimming:

Appendix G: Some Operating System Security Examples
Pages 291-292

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 291...
... Each program can have the "setuid" attribute set; if set, the program runs with the access rights of the owner of the program, rather than those of the program's invoker. Thus, for practical purposes, the program's invoker can establish an effective identity other than his or her own that is to be used when determining access permissions.
From page 292...
... and specific rights that have semantics only for a specific class of objects. Mediation decisions are made by the Security Reference Monitor based upon the token of the subject, the ACL of the object, and the requested access right.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.