• In computer security, mandatory access control (MAC) refers to a type of access control by which a secured environment (e.g., an operating system or a...
    23 KB (2,601 words) - 13:55, 24 May 2025
  • (unless restrained by mandatory access control). Discretionary access control is commonly discussed in contrast to mandatory access control (MAC). Occasionally...
    5 KB (563 words) - 14:06, 16 January 2025
  • access control models have included mandatory access control (MAC), discretionary access control (DAC), and more recently role-based access control (RBAC)...
    15 KB (1,822 words) - 22:03, 23 May 2025
  • role-based access control (RBAC) or role-based security is an approach to restricting system access to authorized users, and to implementing mandatory access control...
    19 KB (2,300 words) - 11:31, 13 May 2025
  • general access control includes identification, authorization, authentication, access approval, and audit. A more narrow definition of access control would...
    19 KB (2,561 words) - 08:01, 6 April 2025
  • Thumbnail for Access control
    and information security, access control (AC) is the action of deciding whether a subject should be granted or denied access to an object (for example...
    50 KB (6,265 words) - 00:59, 24 May 2025
  • Mandatory Integrity Control (MIC) is a core security feature of Windows Vista and later that adds mandatory access control to running processes based on...
    9 KB (1,020 words) - 07:16, 26 November 2024
  • Thumbnail for Security-Enhanced Linux
    that provides a mechanism for supporting access control security policies, including mandatory access controls (MAC). SELinux is a set of kernel modifications...
    36 KB (3,661 words) - 06:42, 3 April 2025
  • Thumbnail for Smack (software)
    Smack (full name: Simplified Mandatory Access Control Kernel) is a Linux kernel security module that protects data and process interaction from malicious...
    9 KB (636 words) - 21:32, 26 February 2025
  • label-based mandatory access control model, a lattice is used to define the levels of security that an object may have and that a subject may have access to....
    3 KB (339 words) - 12:40, 9 July 2024
  • User Account Control (UAC) is a mandatory access control enforcement feature introduced with Microsoft's Windows Vista and Windows Server 2008 operating...
    31 KB (3,569 words) - 13:33, 14 April 2025
  • access control (LBAC) Mandatory access control (MAC) Organisation-based access control (OrBAC) Role-based access control (RBAC) Rule-set-based access control...
    4 KB (401 words) - 22:04, 30 December 2024
  • Thumbnail for Tomoyo Linux
    TOMOYO Linux) is a Linux kernel security module which implements mandatory access control (MAC). Tomoyo Linux is a MAC implementation for Linux that can...
    5 KB (472 words) - 05:47, 26 May 2025
  • featuring a mandatory access control model. The features were migrated into the base Solaris system. Accounting Role-Based Access Control Auditing Device...
    5 KB (506 words) - 14:59, 9 May 2025
  • Thumbnail for AppArmor
    supplements the traditional Unix discretionary access control (DAC) model by providing mandatory access control (MAC). It has been partially included in the...
    11 KB (1,054 words) - 06:44, 14 February 2025
  • Thumbnail for Organisation-based access control
    access control (GBAC) Lattice-based access control (LBAC) Mandatory access control (MAC) Role-based access control (RBAC) Rule-set-based access control (RSBAC)...
    3 KB (292 words) - 16:32, 4 May 2025
  • Lattice-based access control (LBAC) Mandatory access control (MAC) Organisation-based access control (OrBAC) Risk-based authentication Role-based access control (RBAC)...
    6 KB (776 words) - 02:27, 12 August 2024
  • refer to information systems security modes of operations used in mandatory access control (MAC) systems. Often, these systems contain information at various...
    4 KB (383 words) - 07:48, 25 November 2022
  • Thumbnail for Astra Linux
    featuring mandatory access control. It has been officially certified by Russian Defense Ministry, Federal Service for Technical and Export Control and Federal...
    23 KB (1,880 words) - 09:34, 24 March 2025
  • from accessing the information. This is because need to know can be a subjective assessment. Mandatory access control schemes can also audit accesses, in...
    6 KB (831 words) - 21:12, 6 March 2025
  • new security models, e.g. mandatory access control (MAC), access control list (ACL), and role compatibility (RC) On-access virus scanning with Dazuko...
    6 KB (706 words) - 20:03, 21 December 2024
  • strong logical controls must exist to ensure that access to information is strictly controlled. Typically this involves mandatory access control that uses...
    31 KB (4,178 words) - 04:23, 8 March 2025
  • by implementing mandatory access control (MAC). When LIDS was in effect all system network administration operations, chosen file access, any capability...
    2 KB (241 words) - 20:04, 8 March 2025
  • must retain backward-compatibility with the legacy Basic Access Control (BAC), which is mandatory in all EU countries. The European Commission described...
    7 KB (726 words) - 02:31, 24 March 2024
  • general-purpose filtering (firewalling). security_filter module Used for Mandatory Access Control (MAC) networking rules, such as those enabled by the SECMARK and...
    23 KB (2,722 words) - 09:12, 29 April 2025
  • Bell–LaPadula model (category Computer access control)
    Integrity Model Clark–Wilson model Discretionary access control – DAC Graham–Denning model Mandatory access control – MAC Multilevel security – MLS Purdue Enterprise...
    9 KB (1,152 words) - 08:31, 30 April 2025
  • to answer all the requirements for successfully implementing a mandatory access control module, while imposing the fewest possible changes to the Linux...
    7 KB (824 words) - 21:44, 22 April 2025
  • Systems's XTS-400 operating system. Discretionary Access Control – DAC Graham–Denning model Mandatory Access Control – MAC Multilevel security – MLS Security-Enhanced...
    4 KB (576 words) - 22:15, 23 March 2025
  • Thumbnail for Fedora Linux
    default, which implements a variety of security policies, including mandatory access controls, which Fedora adopted early on. Fedora provides a hardening wrapper...
    50 KB (4,120 words) - 12:21, 17 May 2025
  • uses trusted labeling and integrated Mandatory Access Control (MAC) schema as a basis to mediate data flow and access according to user credentials and clearance...
    9 KB (942 words) - 05:11, 3 April 2025