Design Goals
Security: protection against unauthorized use of local and network accessible resources,
Achieved through:
- a Security Reference Monitor.
- Access Tokens
- Owner and Group Identifiers
- System Access Control Lists (SACLs)
- Discretionary Access Control Lists (DACLs)