Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

How is security information tracked? Will I have to maintain complex databases and access tables?

0
10 Posted

How is security information tracked? Will I have to maintain complex databases and access tables?

0
10

Argus does not employ performance-degrading, maintenance-intensive databases or access tables. Rather, Argus security mechanisms place security information directly on each protected resource. The security information associated with users of the system is also placed on each and every process launched by the user. This is done by the operating system itself. Security attributes placed on files, resources, and processes remain with the data so the security protections are enforced even if the resource is anyway modified, for example, by changing its name or moving its location.

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123