Data Structures and the Interface Scheme



next up previous contents
Next: Audit Trail Generation Up: Posix Security Functionality Previous: FIPS 151-2 Security

Data Structures and the Interface Scheme

The different data structures that are defined by the POSIX.6 mechanisms (access control lists, privilege attributes, mandatory access control labels, etc.) are opaque to the applications that use them. The application knows only what types of information are contained in the structure (knows roughly the names of the fields), and not the physical placement or ordering of the structure. Given this, there is no need to standardize on the different structures themselves - only what is contained in them.

The following scheme is used by the different mechanisms to allow applications to manipulate the information contained within the data structures:

  1. read in the information from permanent storage to an allocated working storage area.
  2. update the information in the working storage area.
  3. write the information back to permanent storage.
  4. deallocate the working storage area.
For example, an application that would be used to add an entry to an access control list (ACL) would contain interface calls in the following order:

Once again this scheme provides application developers and programmers the advantage of having to know only the types of information contained in the structures, and not the specifics of the structures themselves. This idea of not being tied to the structures, only the information, certainly allows for application portability.

Each of the following sections that describe the POSIX.6 standard are structured in the following manner:



next up previous contents
Next: Audit Trail Generation Up: Posix Security Functionality Previous: FIPS 151-2 Security



John Barkley
Fri Oct 7 16:17:21 EDT 1994