Also unlike other components, the implementation of the
SC spreads across disciplines. Parts of the security model
incorporate tools outside of the source code. For instance, to
group users into eight user types with inheritable hierarchies,
standard UNIX groups fit well inside the existing security
infrastructure of the laboratory. Processes already exist to
control user group mappings, requiring authorization, sign
off, and auditing. Therefore, the SC provides a gateway to
access the standard UNIX group permissions via pluggable
authentication module instead of providing its own custom set.
Similarly with network access, the model integrates existing
network security infrastructure in terms of virtual networks
and firewalls to reduce the number of devices that can try to
access the operational DCPS software.
Also unlike other components, the implementation of theSC spreads across disciplines. Parts of the security modelincorporate tools outside of the source code. For instance, togroup users into eight user types with inheritable hierarchies,standard UNIX groups fit well inside the existing securityinfrastructure of the laboratory. Processes already exist tocontrol user group mappings, requiring authorization, signoff, and auditing. Therefore, the SC provides a gateway toaccess the standard UNIX group permissions via pluggableauthentication module instead of providing its own custom set.Similarly with network access, the model integrates existingnetwork security infrastructure in terms of virtual networksand firewalls to reduce the number of devices that can try toaccess the operational DCPS software.
การแปล กรุณารอสักครู่..
