Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Path: utzoo!mnetor!uunet!seismo!rutgers!mit-eddie!bu-cs!bzs
From: bzs@bu-cs.BU.EDU (Barry Shein)
Newsgroups: comp.misc
Subject: Re: access-lists vs. unix permissions
Message-ID: <9811@bu-cs.BU.EDU>
Date: Sun, 19-Jul-87 19:15:47 EDT
Article-I.D.: bu-cs.9811
Posted: Sun Jul 19 19:15:47 1987
Date-Received: Sun, 19-Jul-87 22:42:53 EDT
References: <1334@ssc-vax.UUCP> <860@ssc-bee.ssc-vax.UUCP>
Organization: Boston U. Comp. Sci.
Lines: 9
In-reply-to: nelson@ssc-vax.UUCP's message of 15 Jul 87 23:11:50 GMT

Posting-Front-End: GNU Emacs 18.41.4 of Mon Mar 23 1987 on bu-cs (berkeley-unix)



I have a question about this Cn..Bn level security stuff that's
slightly off the subject:

Does anyone know what the market really is for B level or above secure
machines? It seems to me that very few vendors actually implement it.
This is not to detract from the original question, just got me thinking.

	-Barry Shein, Boston University