Trusted Extensions User's Guide

Exit Print View

Updated: July 2014
 
 

D

data
changing label of
index iconHow to Downgrade Data in a Multilevel Dataset
index iconHow to Upgrade Data in a Multilevel Dataset
index iconHow to Move Data Between Windows of Different Labels
determining label ofindex iconHow to Determine the Label of a File
protecting with MACindex iconMandatory Access Control
deallocating devices
basic procedureindex iconHow to Deallocate a Device in Trusted Extensions
desktops
common tasksindex iconHow to Perform Some Common Desktop Tasks in Trusted Extensions
in Trusted Extensionsindex iconDesktop Login in Trusted Extensions
keyboard focusindex iconHow to Change Your Password in Trusted Extensions
logging in remotelyindex iconLogging In Remotely to Trusted Extensions
determining
label of a fileindex iconHow to Determine the Label of a File
label of a windowindex iconHow to Interactively Display a Window Label
Device Manager
deallocating devicesindex iconHow to Deallocate a Device in Trusted Extensions
devices
allocatingindex iconHow to Allocate a Device in Trusted Extensions
clearing prior to reuseindex iconErasing Data on Objects Prior to Object Reuse
protectingindex iconPeripheral Devices Are Protected
secured by allocation requirementindex iconDevice Security in Trusted Extensions
troubleshootingindex iconHow to Allocate a Device in Trusted Extensions
usingindex iconHow to Allocate a Device in Trusted Extensions
directories
visibility of home directoriesindex iconContainers and Labels
discretionary access control (DAC)
definedindex iconDiscretionary Access Control
dominance between labelsindex iconLabels and Transactions
downgrading informationindex iconExamples of Label Relationships in Trusted Extensions
drag-and-drop
effect on labelsindex iconExamples of Label Relationships in Trusted Extensions