Designing an Adaptive Security Architecture


 
Thread Tools Search this Thread
Operating Systems Solaris Solaris BigAdmin RSS Designing an Adaptive Security Architecture
# 1  
Old 12-03-2008
Designing an Adaptive Security Architecture

This Sun BluePrints article discusses a new architectural approach, adaptive security, which is based on the principles of complex adaptive systems and aims to reduce potential security threats and safeguard the functionality, performance, availability, and integrity of IT systems.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Designing

Dear all, Do you guys use any tool to design shell scripts?. My requirement is to simplify the logic/design of shell scripts before you actually write it. In other words i need to put the design i have in mind to words before i start writing it. Thanks in advance. (3 Replies)
Discussion started by: earlysame55
3 Replies

2. UNIX for Advanced & Expert Users

Unix Kernel Designing

Hello, I want to know what a kernel is? what are its functions and uses. what is a unix kernel? can i make a new kernel like unix or any other OS. if yes what type of programming is needed or can i use C programming language.if there is C, then what kind of C is required (hardware like... (2 Replies)
Discussion started by: vibhory2j
2 Replies

3. Shell Programming and Scripting

designing a shell

Hi I need to expand some shell code so it would be able to do more than it is doing now. Currently it can do stuff like quit when q is pressed, display a prompt but not much more. I have to make the shell have capabilities like cd (changing directories) redirection of input and output, for... (2 Replies)
Discussion started by: newtoallthis
2 Replies
Login or Register to Ask a Question
deallocate(1)                                                                                                                        deallocate(1)

NAME
deallocate - device deallocation SYNOPSIS
deallocate [-s] device deallocate [-s] [-F] device deallocate [-s] -I The deallocate utility deallocates a device allocated to the evoking user. device can be a device defined in device_allocate(4) or one of the device special files associated with the device. It resets the ownership and the permission on all device special files associated with device, disabling the user's access to that device. This option can be used by an authorized user to remove access to the device by another user. The required authorization is solaris.device.allocate. When deallocation or forced deallocation is performed, the appropriate device cleaning program is executed, based on the contents of device_allocate(4). These cleaning programs are normally stored in /etc/security/lib. The following options are supported: device Deallocate the device associated with the device special file specified by device. -s Silent. Suppresses any diagnostic output. -F device Forces deallocation of the device associated with the file specified by device. Only a user with the solaris.device.revoke authorization is permitted to use this option. -I Forces deallocation of all allocatable devices. Only a user with the solaris.device.revoke authorization is permitted to use this option. This option should only be used at system initialization. The following exit values are returned: non--zero An error occurred. /etc/security/device_allocate /etc/security/device_maps /etc/security/dev/* /etc/security/lib/* See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWcsu | +-----------------------------+-----------------------------+ allocate(1), list_devices(1), bsmconv(1M), dminfo(1M), mkdevalloc(1M), mkdevmaps(1M), device_allocate(4), device_maps(4), attributes(5) The functionality described in this man page is available only if the Basic Security Module (BSM) has been enabled. See bsmconv(1M) for more information. /etc/security/dev, mkdevalloc(1M), and mkdevmaps(1M) might not be supported in a future release of the Solaris Operating Environment. 28 Mar 2005 deallocate(1)