Building a trusted computing base
Mandatory vs. Discretionary Access Control - Multi-Level Security (MLS)
96.
Who can do what? DAC vs. MAC
97.
Discretionary Access Control (DAC)
98.
DAC and ACLs
99.
Mandatory Access Control