Skip to Content
SELinux by Example: Using Security Enhanced Linux
book

SELinux by Example: Using Security Enhanced Linux

by Frank Mayer, Karl MacMillan, David Caplan
July 2006
Intermediate to advanced
456 pages
9h 45m
English
Pearson
Content preview from SELinux by Example: Using Security Enhanced Linux

Appendix C. Object Classes and Permissions

In this chapter

• C.1 Common Permission Sets

• C.2 Object Classes and Defined Permission Sets

This appendix provides a detailed summary and listing of all object classes and permissions supported by the kernel at the time of this writing. Be aware that object classes and permissions are occasionally changed and added. Some object classes and permissions listed are no longer used. They remain defined primarily for compatibility reasons. Their use in a policy would have no effect on a system with an up-to-date kernel. You can find a maintained list of object classes and permissions at www.tresys.com/selinux. You can also use the National Security Agency (NSA) technical report “Implementing SELinux as a ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Android Security Internals

Android Security Internals

Nikolay Elenkov
SELinux Cookbook

SELinux Cookbook

Sven Vermeulen
CentOS Quick Start Guide

CentOS Quick Start Guide

Shiwang Kalkhanda
Security Superstream: Ransomware

Security Superstream: Ransomware

Chloé Messdaghi, Alissa Knight, Cynthia Brumfield, Edna Conway, Kellyn Wagner Ramsdell, Laurie Iacono

Publisher Resources

ISBN: 0131963694Purchase book