Lines Matching full:mechanisms
67 implement with the UNIX security mechanisms.
106 While mechanisms such as chroot(2) provide a modest
108 that these mechanisms have serious shortcomings, both in terms of the
119 mechanisms, such as chroot(2), to what effectively amounts to a
138 they determine how discretionary access control mechanisms will be applied, and
145 with modifying the semantics of discretionary access control mechanisms,
277 file system root are protected. Traditional mechanisms for breaking out of
308 sysctl or process file system monitoring mechanisms. Jail does not prevent,
310 mechanisms via accepted interfaces \(em for example, two processes may communicate
362 which are partitioned off by other mechanisms.
384 fine-grained access control mechanisms, and maintaining a consistent