A way to monitor your files

Doug Gwyn gwyn at smoke.BRL.MIL
Tue Sep 12 13:53:44 AEST 1989


In article <4113 at buengc.BU.EDU> bph at buengc.bu.edu (Blair P. Houghton) writes:
>As long as the superuser is a sufficiently cleared individual, then the
>proper security is being maintained no matter what software he can use
>to get into the files.  As in a traditional paper system, one has to
>place trust in the handlers of the data.

If you recall how this thread started, the individual was complaining
that his local super-users were abusing their powers and snooping in
his private data files.  The discussion about DoD trusted computing
systems started with somebody's more-or-less irrelevant reply.  The
original situation had nothing to do with TCBs, MACs, etc.



More information about the Comp.unix.questions mailing list