Next: Base Protection
Up: The Role Compatibility Security
Previous: Comparison to RC Model
Application Example
This section describes how the RC model is used to secure a typical server
system. The approach given here can easily be adapted to many other types
of services.
Subsections
Amon Ott