Expand TOC
HP OpenVMS Guide to System Security
Legal Notice
Preface
Security Overview
Security for the User
Using the System Responsibly
Protecting Data
Contents of a User's Security Profile
Security Profile of Objects
How the System Determines If a User Can Access a Protected Object
Controlling Access with ACLs
Controlling Access with Protection Codes
Understanding Privileges and Control Access
Auditing Protected Objects
Descriptions of Object Classes
Security for the System Administrator
Glossary
Index