Type enforcement

From Wiki @ Karl Jones dot com
Revision as of 12:21, 20 September 2016 by Karl Jones (Talk | contribs) (Created page with "In computer science, the concept of '''type enforcement''' (TE) in the field of information technology is related to access control. == Description == Implementing T...")

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

In computer science, the concept of type enforcement (TE) in the field of information technology is related to access control.

Description

Implementing TE gives priority to “mandatory access control” (MAC) over “discretionary access control” (DAC). Access clearance is first given to a subject (e.g. process) accessing objects (e.g. files, records, messages) based on rules defined in an attached security context.

A security context in a domain is defined by a domain security policy. In the Linux security module (LSM) in SELinux, the security context is an extended attribute.

Type enforcement implementation is a prerequisite for MAC, and a first step before “multi-level security” (MLS) or its replacement “multi categories security” (MCS).

It is a complement of “role based access control” (RBAC).

See also

External links