A way to monitor your files
Doug Gwyn
gwyn at smoke.BRL.MIL
Tue Sep 12 13:53:44 AEST 1989
In article <4113 at buengc.BU.EDU> bph at buengc.bu.edu (Blair P. Houghton) writes:
>As long as the superuser is a sufficiently cleared individual, then the
>proper security is being maintained no matter what software he can use
>to get into the files. As in a traditional paper system, one has to
>place trust in the handlers of the data.
If you recall how this thread started, the individual was complaining
that his local super-users were abusing their powers and snooping in
his private data files. The discussion about DoD trusted computing
systems started with somebody's more-or-less irrelevant reply. The
original situation had nothing to do with TCBs, MACs, etc.
More information about the Comp.unix.questions
mailing list