Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Path: utzoo!mnetor!seismo!brl-adm!brl-smoke!gwyn
From: gwyn@brl-smoke.ARPA (Doug Gwyn )
Newsgroups: comp.unix.questions
Subject: Re: security
Message-ID: <5510@brl-smoke.ARPA>
Date: Mon, 12-Jan-87 16:18:01 EST
Article-I.D.: brl-smok.5510
Posted: Mon Jan 12 16:18:01 1987
Date-Received: Tue, 13-Jan-87 21:37:11 EST
References: <172@herman.UUCP>
Reply-To: gwyn@brl.arpa (Doug Gwyn (VLD/VMB) )
Organization: Ballistic Research Lab (BRL), APG, MD.
Lines: 14

In article <172@herman.UUCP> det@herman.UUCP (Derek Terveer) writes:
>...  My gripe happens to be security.  I find
>the user/group/world security quite cumbersome and tedious to manage as a
>system administrator with a brood of ~70 users.  To me, a security scheme
>should be a tad more specific than Unix allows.

It isn't all that hard to implement an Access Control List scheme
for UNIX; the main difficulty lies in integrating it into the
existing system.  I plan to produce a simple ACL system sometime
this year (it's needed as part of a large application project) and
will make it available free to whoever wants it.  Most likely its
use won't be transparent (e.g., one might have to invoke a utility
to provide the access, rather than having it done by the shell or
other normal part of UNIX).