Previous Topic: Entering the SystemNext Topic: Access Classified Data Sets


Verifying User Access to An Object

After a user has successfully logged onto the system, their security label becomes attached to their address space. When the user tries to access an object, CA Top Secret performs two checks: a MAC check and a DAC check. The MAC check compares the user's label with the object's label to establish the label dominance relationship. The DAC check determines if a rule exists that permits the user to access the object and what type of access is permitted. If MAC permits the access, DAC is performed. If the MAC check fails, no DAC check is performed.

Access is granted according to the following criteria:

The following applies if write-down is not restricted:

The following applies if write-down is restricted: