Discover Government News
NSA preps Spook Linux 0.1
The technology draws heavily on Secure Computing's Type Enforcement framework which protects applications and network services, by segmenting them into domains. This type enforcement framework, together with role-based access control components, define security policy configuration files.
The link for this article located at TheRegister is no longer available.