Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Path: utzoo!mnetor!seismo!brl-adm!brl-smoke!gwyn From: gwyn@brl-smoke.ARPA (Doug Gwyn ) Newsgroups: comp.unix.questions Subject: Re: security Message-ID: <5510@brl-smoke.ARPA> Date: Mon, 12-Jan-87 16:18:01 EST Article-I.D.: brl-smok.5510 Posted: Mon Jan 12 16:18:01 1987 Date-Received: Tue, 13-Jan-87 21:37:11 EST References: <172@herman.UUCP> Reply-To: gwyn@brl.arpa (Doug Gwyn (VLD/VMB)) Organization: Ballistic Research Lab (BRL), APG, MD. Lines: 14 In article <172@herman.UUCP> det@herman.UUCP (Derek Terveer) writes: >... My gripe happens to be security. I find >the user/group/world security quite cumbersome and tedious to manage as a >system administrator with a brood of ~70 users. To me, a security scheme >should be a tad more specific than Unix allows. It isn't all that hard to implement an Access Control List scheme for UNIX; the main difficulty lies in integrating it into the existing system. I plan to produce a simple ACL system sometime this year (it's needed as part of a large application project) and will make it available free to whoever wants it. Most likely its use won't be transparent (e.g., one might have to invoke a utility to provide the access, rather than having it done by the shell or other normal part of UNIX).