Designing an Adaptive Security Architecture


 
Thread Tools Search this Thread
Operating Systems Solaris Solaris BigAdmin RSS Designing an Adaptive Security Architecture
# 1  
Old 12-03-2008
Designing an Adaptive Security Architecture

This Sun BluePrints article discusses a new architectural approach, adaptive security, which is based on the principles of complex adaptive systems and aims to reduce potential security threats and safeguard the functionality, performance, availability, and integrity of IT systems.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Designing

Dear all, Do you guys use any tool to design shell scripts?. My requirement is to simplify the logic/design of shell scripts before you actually write it. In other words i need to put the design i have in mind to words before i start writing it. Thanks in advance. (3 Replies)
Discussion started by: earlysame55
3 Replies

2. UNIX for Advanced & Expert Users

Unix Kernel Designing

Hello, I want to know what a kernel is? what are its functions and uses. what is a unix kernel? can i make a new kernel like unix or any other OS. if yes what type of programming is needed or can i use C programming language.if there is C, then what kind of C is required (hardware like... (2 Replies)
Discussion started by: vibhory2j
2 Replies

3. Shell Programming and Scripting

designing a shell

Hi I need to expand some shell code so it would be able to do more than it is doing now. Currently it can do stuff like quit when q is pressed, display a prompt but not much more. I have to make the shell have capabilities like cd (changing directories) redirection of input and output, for... (2 Replies)
Discussion started by: newtoallthis
2 Replies
Login or Register to Ask a Question
SECMOD.DB(5)						     Network Security Services						      SECMOD.DB(5)

NAME
secmod.db - Legacy NSS security modules database DESCRIPTION
secmod.db is an NSS security modules database. The security modules database is used to keep track of the NSS security modules. The NSS security modules export their services via the PKCS #11 API which NSS uses as its Services Provider Interface. The command line utility modutil is used for managing PKCS #11 module information both within secmod.db files and within hardware tokens. For new applications the recommended way of tracking security modules is via the pkcs11.txt configuration file used in conjunction the new sqlite-based shared database format for certificate and key databases. FILES
/etc/pki/nssdb/secmod.db SEE ALSO
modutil(1), cert8.db(5), cert9.db(5), key3.db(5), key4.db(5), pkcs11.txt(5) AUTHORS
The nss libraries were written and maintained by developers with Netscape, Red Hat, Sun, Oracle, Mozilla, and Google. Authors: Elio Maldonado <emaldona@redhat.com>. LICENSE
Licensed under the Mozilla Public License, v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain one at http://mozilla.org/MPL/2.0/. nss 3.15.4 17 June 2014 SECMOD.DB(5)