gkc@hare.udev.cdc.com (gk chace) (10/03/90)
Is the buzzword "sentry file" well established terminology? The reference which I saw seemed to hint that it is an old workaround for what OS security folks (Orange book) would now call an access control list, ie, a database naming precisely which users can get at some other file. There was also a hint that the sentry file was accompanied by a sentry application, ie, a program which validates thru the sentry file then accesses the real file. This is probably arcane enough that replies are more efficient as email than as postings. advTHANXance ------------ Gordon K. Chace Control Data Corp. (612) 482-6524 (fax 482-2791) gkc@udev.cdc.com