Lines Matching full:security
35 .Nd guide to adding security considerations sections to manual pages
38 adding security considerations sections to manual pages.
47 system should contain a security considerations section
48 describing what security requirements can be broken
53 On one hand, security consideration sections must not be too verbose,
55 On the other hand, security consideration sections must not be incomplete,
59 in the security consideration section for a given feature of the
64 those general security requirements that can be violated
66 There are four classes of security requirements:
81 A good security considerations section
83 to violate each general security requirement in the list.
94 Security problems are often interrelated;
108 Due to the need for brevity, security consideration sections
114 Security considerations sections for most individual functions can follow
119 Provide one or two sentences describing each potential security
123 security problem.
128 This is an example security considerations section for the
152 It may be a security concern for a string to be truncated at all.
188 Security considerations sections for tools and commands
190 Let your list of potentially-violated security requirements
194 This is an example security considerations section for the
216 .Xr security 7 ,
220 .%B "Fundamentals of Computer Security Technology"