DOC HOME SITE MAP MAN PAGES GNU INFO SEARCH PRINT BOOK
 
Introduction to security

Security mechanisms visible to users

The kernel routines are accessible only indirectly, through system calls that are issued by processes. However, the system does contain components visible at the user level that are relevant to security. They are


Next topic: Identification and authentication (I&A)
Previous topic: Object reuse and physical media

© 2004 The SCO Group, Inc. All rights reserved.
UnixWare 7 Release 7.1.4 - 22 April 2004