next up previous
Next: Base Protection Up: The Role Compatibility Security Previous: Comparison to RC Model


Application Example

This section describes how the RC model is used to secure a typical server system. The approach given here can easily be adapted to many other types of services.

Subsections

Amon Ott