back to article Moving beyond user rights

It goes without saying that IT systems should, in principle, be secured so that only properly authorised users can access data, applications or services. Most companies are pretty good at giving authorised users access to the systems and data they need to do their jobs. The trouble is that this is only half the job. It is just …

COMMENTS

This topic is closed for new posts.
  1. John Savard

    MULTICS

    The technology to address this problem is not entirely new. Multics was the first operating system that attempted to provide the capability being sought, and Security Enhanced Linux also incorporates this type of feature.

This topic is closed for new posts.

Other stories you might like