Part I. Understanding Veil2 And Relational Security

Table of Contents

1. What Is A Relational Security System?
1.1. What This Means - Some Examples
2. How Is Relational Security Different?
2.1. The Traditional Approach
2.2. The Relational Security Approach
2.3. Where Are Access Controls Implemented In A Relational Security System?
2.4. How Is Access Restricted In A Relational Security System?
2.5. Ease of Reasoning
2.6. Comprehensiveness
3. Why Use Veil2
4. Veil2 Concepts
4.1. Privileges
4.2. Scopes
4.3. Roles
4.4. Role Assignments
4.5. Security Contexts
4.6. Scope (and Context) Promotion
4.7. Authentication Contexts
4.8. Session Contexts
5. What is Veil2 And What Does It Provide?
5.1. How It Works - An Overview
5.2. Refactoring Your Systems To Use Veil2
6. How Difficult Is This?
6.1. Frequently Imagined Criticisms (FIC)