Part I. Understanding Veil2 And Relational Security

Table of Contents

1. What Is A Relational Security System?
2. How Is Relational Security Different?
2.1. The Traditional Approach
2.2. The Relational Security Approach
2.3. Where Are Access Controls Implemented In A Relational Security System?
2.4. How Is Access Restricted In A Relational Security System?
2.5. Ease of Reasoning
2.6. Comprehensiveness
3. Why Use Veil2
4. Veil2 Concepts
4.1. Privileges
4.2. Security Contexts
4.3. Scopes
4.4. Roles
4.5. Role Assignments
4.6. Scope (and Context) Promotion
4.7. Authentication Contexts
4.8. Session Contexts
5. What is Veil2 And What Does It Provide?
5.1. How It Works - An Overview
5.2. Refactoring Your Systems To Use Veil2
6. How Difficult Is This?
6.1. Frequently Imagined Criticisms (FIC)