Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Path: utzoo!mnetor!uunet!seismo!rutgers!mit-eddie!bu-cs!bzs From: bzs@bu-cs.BU.EDU (Barry Shein) Newsgroups: comp.misc Subject: Re: access-lists vs. unix permissions Message-ID: <9811@bu-cs.BU.EDU> Date: Sun, 19-Jul-87 19:15:47 EDT Article-I.D.: bu-cs.9811 Posted: Sun Jul 19 19:15:47 1987 Date-Received: Sun, 19-Jul-87 22:42:53 EDT References: <1334@ssc-vax.UUCP> <860@ssc-bee.ssc-vax.UUCP> Organization: Boston U. Comp. Sci. Lines: 9 In-reply-to: nelson@ssc-vax.UUCP's message of 15 Jul 87 23:11:50 GMT Posting-Front-End: GNU Emacs 18.41.4 of Mon Mar 23 1987 on bu-cs (berkeley-unix) I have a question about this Cn..Bn level security stuff that's slightly off the subject: Does anyone know what the market really is for B level or above secure machines? It seems to me that very few vendors actually implement it. This is not to detract from the original question, just got me thinking. -Barry Shein, Boston University