Figure 2-1: z/OS UNIX with open systems interfaces
Figure 2-2: Examples of a parent process issuing fork() and spawn()
Figure 2-3: z/OS UNIX physical file systems
Figure 2-4: Hierarchical file systems and mount points
Figure 2-5: File security packet
Figure 2-6: The z/OS UNIX initialization process
Figure 3-1: The z/OS UNIX user dual identity and access rights
Figure 3-2: RACF user and group profiles
Figure 4-1: UNIX daemon fork() or spawn()
Figure 4-2: The UNIX thread concept and the z/OS UNIX implementation
Figure 5-1: The controlled environment process
Figure 5-2: pthread_security_np and BPX.SERVER
Figure 6-2: RACF and the file security packet
Figure 6-4: Permissions bits in FSP
Figure 6-5: Permissions bits signification
Figure 6-6: Octal values for permission bits
Figure 6-7: Default permission bits for files and directories
Figure 6-9: z/OS UNIX ACL structure
Figure 6-10: Security control blocks
Figure 6-11: Authorization checking flow without ACL
Figure 6-12: Authorization checking flow with ACL
Figure 7-1: The MLS security model
Figure 9-1: Overview of auditing options for z/OS UNIX
Figure 9-2: Auditing flags in the file security packet
Figure 9-3: Producing audit reports
原文:https://www.cnblogs.com/cathygx/p/13729833.html