next up previous
Next: Base Protection Up: The Role Compatibility Security Previous: Comparison to RC Model

Application Example

This section describes how the RC model is used to secure a typical server system. The approach given here can easily be adapted to many other types of services.


Amon Ott