In computer security, mandatory access control (MAC) refers to a type of access control by which a secured environment (e.g., an operating system or a...
23 KB (2,601 words) - 13:55, 24 May 2025
(unless restrained by mandatory access control). Discretionary access control is commonly discussed in contrast to mandatory access control (MAC). Occasionally...
5 KB (563 words) - 14:06, 16 January 2025
access control models have included mandatory access control (MAC), discretionary access control (DAC), and more recently role-based access control (RBAC)...
15 KB (1,822 words) - 22:03, 23 May 2025
role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users, and to implementing mandatory access control...
19 KB (2,300 words) - 11:31, 13 May 2025
and information security, access control (AC) is the action of deciding whether a subject should be granted or denied access to an object (for example...
50 KB (6,265 words) - 00:59, 24 May 2025
general access control includes identification, authorization, authentication, access approval, and audit. A more narrow definition of access control would...
19 KB (2,561 words) - 08:01, 6 April 2025
Mandatory Integrity Control (MIC) is a core security feature of Windows Vista and later that adds mandatory access control to running processes based on...
9 KB (1,020 words) - 07:16, 26 November 2024
Security-Enhanced Linux (redirect from Access vector cache)
that provides a mechanism for supporting access control security policies, including mandatory access controls (MAC). SELinux is a set of kernel modifications...
36 KB (3,661 words) - 06:42, 3 April 2025
Smack (software) (redirect from Simplified Mandatory Access Control Kernel)
Smack (full name: Simplified Mandatory Access Control Kernel) is a Linux kernel security module that protects data and process interaction from malicious...
9 KB (636 words) - 21:32, 26 February 2025
label-based mandatory access control model, a lattice is used to define the levels of security that an object may have and that a subject may have access to....
3 KB (339 words) - 12:40, 9 July 2024
access control (LBAC) Mandatory access control (MAC) Organisation-based access control (OrBAC) Role-based access control (RBAC) Rule-set-based access control...
4 KB (401 words) - 22:04, 30 December 2024
User Account Control (UAC) is a mandatory access control enforcement feature introduced with Microsoft's Windows Vista and Windows Server 2008 operating...
31 KB (3,569 words) - 13:33, 14 April 2025
TOMOYO Linux) is a Linux kernel security module which implements mandatory access control (MAC). Tomoyo Linux is a MAC implementation for Linux that can...
5 KB (472 words) - 05:47, 26 May 2025
featuring a mandatory access control model. The features were migrated into the base Solaris system. Accounting Role-Based Access Control Auditing Device...
5 KB (506 words) - 14:59, 9 May 2025
supplements the traditional Unix discretionary access control (DAC) model by providing mandatory access control (MAC). It has been partially included in the...
11 KB (1,054 words) - 06:44, 14 February 2025
access control (GBAC) Lattice-based access control (LBAC) Mandatory access control (MAC) Role-based access control (RBAC) Rule-set-based access control (RSBAC)...
3 KB (292 words) - 16:32, 4 May 2025
refer to information systems security modes of operations used in mandatory access control (MAC) systems. Often, these systems contain information at various...
4 KB (383 words) - 07:48, 25 November 2022
featuring mandatory access control. It has been officially certified by Russian Defense Ministry, Federal Service for Technical and Export Control and Federal...
23 KB (1,880 words) - 09:34, 24 March 2025
Lattice-based access control (LBAC) Mandatory access control (MAC) Organisation-based access control (OrBAC) Risk-based authentication Role-based access control (RBAC)...
6 KB (776 words) - 02:27, 12 August 2024
whether another person should have access. Need to know is often concurrently applied with mandatory access control schemes, in which the lack of an official...
6 KB (831 words) - 21:12, 6 March 2025
Multilevel security (redirect from Controlled interface)
strong logical controls must exist to ensure that access to information is strictly controlled. Typically this involves mandatory access control that uses...
31 KB (4,178 words) - 04:23, 8 March 2025
RSBAC (redirect from Rule-set-based access control)
new security models, e.g. mandatory access control (MAC), access control list (ACL), and role compatibility (RC) On-access virus scanning with Dazuko...
6 KB (706 words) - 20:03, 21 December 2024
by implementing mandatory access control (MAC). When LIDS was in effect all system network administration operations, chosen file access, any capability...
2 KB (241 words) - 20:04, 8 March 2025
default, which implements a variety of security policies, including mandatory access controls, which Fedora adopted early on. Fedora provides a hardening wrapper...
50 KB (4,120 words) - 12:21, 17 May 2025
general-purpose filtering (firewalling). security_filter module Used for Mandatory Access Control (MAC) networking rules, such as those enabled by the SECMARK and...
23 KB (2,722 words) - 09:12, 29 April 2025
Systems's XTS-400 operating system. Discretionary Access Control – DAC Graham–Denning model Mandatory Access Control – MAC Multilevel security – MLS Security-Enhanced...
4 KB (576 words) - 22:15, 23 March 2025
Bell–LaPadula model (category Computer access control)
Integrity Model Clark–Wilson model Discretionary access control – DAC Graham–Denning model Mandatory access control – MAC Multilevel security – MLS Purdue Enterprise...
9 KB (1,152 words) - 08:31, 30 April 2025
to answer all the requirements for successfully implementing a mandatory access control module, while imposing the fewest possible changes to the Linux...
7 KB (824 words) - 21:44, 22 April 2025
Requirements (SFRs) for Labeled Security Protection Profile (LSPP) and mandatory access control (MAC). The Common Criteria is the result of a multi-year effort...
4 KB (395 words) - 06:48, 14 February 2025
must retain backward-compatibility with the legacy Basic Access Control (BAC), which is mandatory in all EU countries. The European Commission described...
7 KB (726 words) - 02:31, 24 March 2024