Prev
Next
Introduction to Veil2
Home
Chapter 1. What Is A Relational Security System?
Part I. Understanding Veil2 And Relational Security
Table of Contents
1. What Is A Relational Security System?
2. How Is Relational Security Different?
2.1. The
Traditional
Approach
2.2. The Relational Security Approach
2.3. Where Are Access Controls Implemented In A Relational Security System?
2.4. How Is Access Restricted In A Relational Security System?
2.5. Ease of Reasoning
2.6. Comprehensiveness
3. Why Use
Veil2
4.
Veil2
Concepts
4.1. Privileges
4.2. Security Contexts
4.3. Scopes
4.4. Roles
4.5. Role Assignments
4.6. Scope (and Context) Promotion
4.7. Authentication Contexts
4.8. Session Contexts
5. What is
Veil2
And What Does It Provide?
5.1. How It Works - An Overview
5.2. Refactoring Your Systems To Use
Veil2
6. How Difficult Is This?
6.1. Frequently Imagined Criticisms (FIC)