How is security information tracked? Will I have to maintain complex databases and access tables?
Argus does not employ performance-degrading, maintenance-intensive databases or access tables. Rather, Argus security mechanisms place security information directly on each protected resource. The security information associated with users of the system is also placed on each and every process launched by the user. This is done by the operating system itself. Security attributes placed on files, resources, and processes remain with the data so the security protections are enforced even if the resource is anyway modified, for example, by changing its name or moving its location.