In computer security, mandatory access control (MAC) refers to a type of access control by which a secured environment (e.g., an operating system or a...
23 KB (2,601 words) - 13:55, 24 May 2025
(unless restrained by mandatory access control). Discretionary access control is commonly discussed in contrast to mandatory access control (MAC). Occasionally...
5 KB (563 words) - 14:06, 16 January 2025
role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users, and to implementing mandatory access control...
19 KB (2,300 words) - 13:50, 4 July 2025
access control models have included mandatory access control (MAC), discretionary access control (DAC), and more recently role-based access control (RBAC)...
15 KB (1,822 words) - 22:03, 23 May 2025
and information security, access control (AC) is the action of deciding whether a subject should be granted or denied access to an object (for example...
51 KB (6,351 words) - 13:59, 16 July 2025
general access control includes identification, authorization, authentication, access approval, and audit. A more narrow definition of access control would...
19 KB (2,561 words) - 18:21, 21 June 2025
Mandatory Integrity Control (MIC) is a core security feature of Windows Vista and later that adds mandatory access control to running processes based on...
9 KB (1,020 words) - 07:16, 26 November 2024
Security-Enhanced Linux (redirect from Access vector cache)
that provides a mechanism for supporting access control security policies, including mandatory access controls (MAC). SELinux is a set of kernel modifications...
36 KB (3,644 words) - 14:57, 30 June 2025
label-based mandatory access control model, a lattice is used to define the levels of security that an object may have and that a subject may have access to....
3 KB (339 words) - 12:40, 9 July 2024
Smack (software) (redirect from Simplified Mandatory Access Control Kernel)
Smack (full name: Simplified Mandatory Access Control Kernel) is a Linux kernel security module that protects data and process interaction from malicious...
9 KB (636 words) - 21:32, 26 February 2025
access control (LBAC) Mandatory access control (MAC) Organisation-based access control (OrBAC) Role-based access control (RBAC) Rule-set-based access control...
4 KB (401 words) - 22:04, 30 December 2024
User Account Control (UAC) is a mandatory access control enforcement feature introduced with Microsoft's Windows Vista and Windows Server 2008 operating...
31 KB (3,535 words) - 01:19, 30 June 2025
supplements the traditional Unix discretionary access control (DAC) model by providing mandatory access control (MAC). It has been partially included in the...
11 KB (1,054 words) - 06:44, 14 February 2025
TOMOYO Linux) is a Linux kernel security module which implements mandatory access control (MAC). Tomoyo Linux is a MAC implementation for Linux that can...
5 KB (472 words) - 05:47, 26 May 2025
featuring a mandatory access control model. The features were migrated into the base Solaris system. Accounting Role-Based Access Control Auditing Device...
5 KB (506 words) - 14:59, 9 May 2025
access control (GBAC) Lattice-based access control (LBAC) Mandatory access control (MAC) Role-based access control (RBAC) Rule-set-based access control (RSBAC)...
3 KB (292 words) - 16:32, 4 May 2025
featuring mandatory access control. It has been officially certified by Russian Defense Ministry, Federal Service for Technical and Export Control and Federal...
24 KB (1,880 words) - 13:23, 10 July 2025
Lattice-based access control (LBAC) Mandatory access control (MAC) Organisation-based access control (OrBAC) Risk-based authentication Role-based access control (RBAC)...
6 KB (776 words) - 02:27, 12 August 2024
Type enforcement (section Access)
technology, is an access control mechanism for regulating access in computer systems. Implementing TE gives priority to mandatory access control (MAC) over discretionary...
5 KB (610 words) - 15:08, 25 January 2022
whether another person should have access. Need to know is often concurrently applied with mandatory access control schemes, in which the lack of an official...
6 KB (831 words) - 18:04, 19 June 2025
refer to information systems security modes of operations used in mandatory access control (MAC) systems. Often, these systems contain information at various...
4 KB (383 words) - 07:48, 25 November 2022
Windows software on Darwin. SEDarwin was a port of TrustedBSD mandatory access control framework and portions of the SELinux framework to Darwin. It was...
46 KB (2,765 words) - 17:08, 16 July 2025
RSBAC (redirect from Rule-set-based access control)
new security models, e.g. mandatory access control (MAC), access control list (ACL), and role compatibility (RC) On-access virus scanning with Dazuko...
6 KB (706 words) - 20:03, 21 December 2024
general-purpose filtering (firewalling). security_filter module Used for Mandatory Access Control (MAC) networking rules, such as those enabled by the SECMARK and...
23 KB (2,721 words) - 09:12, 29 April 2025
Multilevel security (redirect from Controlled interface)
strong logical controls must exist to ensure that access to information is strictly controlled. Typically this involves mandatory access control that uses...
31 KB (4,178 words) - 04:23, 8 March 2025
Bell–LaPadula model (category Computer access control)
Integrity Model Clark–Wilson model Discretionary access control – DAC Graham–Denning model Mandatory access control – MAC Multilevel security – MLS Purdue Enterprise...
9 KB (1,152 words) - 08:31, 30 April 2025
default, which implements a variety of security policies, including mandatory access controls, which Fedora adopted early on. Fedora provides a hardening wrapper...
49 KB (4,094 words) - 11:37, 17 July 2025
to answer all the requirements for successfully implementing a mandatory access control module, while imposing the fewest possible changes to the Linux...
7 KB (824 words) - 21:44, 22 April 2025
Mandatory Palestine was a British geopolitical entity that existed between 1920 and 1948 in the region of Palestine, and after 1922, under the terms of...
161 KB (17,157 words) - 03:35, 7 July 2025
Requirements (SFRs) for Labeled Security Protection Profile (LSPP) and mandatory access control (MAC). The Common Criteria is the result of a multi-year effort...
4 KB (395 words) - 06:48, 14 February 2025