You are hereDownloads

Downloads


The following Trusted RUBIX documentation is available for download in PDF format:

 

SQL-ODBC Tutorial: The SQL-ODBC Tutorial gives step-by-step examples of using the Trusted RUBIX SQL language and building applications using the ODBC API.

 

ODBC Guide: The ODBC Guide details the installation, configuration, and use of the Trusted RUBIX ODBC driver.

 

SQL Reference Guide: The SQL Reference Guide gives a complete reference to using the Trusted RUBIX SQL language.

 

Security Features Users Guide: The Security Features Users Guide (SFUG) presents the security protections provided by Trusted RUBIX to users. It also details the uses and interactions of the various security protections with examples. This document illustrates security protection mechanisms while the Trusted RUBIX Reference Guides detail the full syntax of all commands used in this document.

 

Trusted Facility Manual: The Trusted Facility Manual (TFM) is primarily designed for the security and administrative personnel managing the trusted facility. It describes functions and privileges to be controlled when running a trusted facility, details the security policy, its implementation procedures, audit mechanisms and various rights, restricted functions, and roles associated with the secure operation of Trusted RUBIX. The TFM provides guidelines on the consistent and effective use of the Trusted RUBIX protection features and its interaction with the host trusted operating system.

 

Administrative Commands Reference Guide: The Administrative Commands Reference Guide details the use and behavior of the Trusted RUBIX administrative commands. Administrative commands are used to import/export table rows, dump/restore databases, control and view the audit trail, perform interactive SQL commands, control server processes, manipulate databases, and control log files.

 

Information Schema Guide: The Information Schema Guide details the structure and security behavior of the Trusted RUBIX Information Schema tables and views.

 

Multilevel Security White Paper: The Multilevel Security White Paper gives a detailed introduction and overview to Multilevel Security and its use within Trusted RUBIX.

 

SELinux White Paper: The SELinux White Paper gives a detailed introduction and overview to SELinux and its use within Trusted RUBIX.

 

SELinux Guide: The SELinux Guide details the use of Trusted RUBIX on host operating systems that utilize the SELinux security mechanism.

 

Red Hat Enterprise Linux 6 SELinux Installation and Quick Start: The Red Hat Enterprise Linux 6 (RHEL6) SELinux Installation and Quick Start gives instructions on installing Trusted RUBIX on the RHEL6 SELinux platform. It also gives a quick start guide to using Trusted RUBIX on the RHEL6 SELinux platform.

 

Attribute Based Access Control and SPM White Paper: The Attribute Based Access Control White Paper gives a detailed introduction and overview to Attribute Based Access Control, the Trusted RUBIX Security Policy Manager and its use within Trusted RUBIX.

 

Security Policy Manager Reference Guide: The Security Policy Manager Reference Guide gives a complete reference to using the Trusted RUBIX Security Markup Language (RXSML) to create and apply Attribute Based Access Control security policies. RXSML allows custom security policies and policy sets to be constructed using Trusted RUBIX DBMS attributes and is based upon the OASIS XACML 2.0 standard.

 

Security Policy Manager Tutorial: The Security Policy Manager Tutorial gives step-by-step examples of building and applying custom security policies to Trusted RUBIX DBMS objects.

 

Security Policy Manager Data Sheet: The Security Policy Manager Data Sheet presents a summary of the capabilities of the Trusted RUBIX Security Policy Manager.

 

Security Policy Manager Solutions Guide: The Security Policy Manager Solutions Guide gives a summary of solutions that may be achieved using the Trusted RUBIX Security Policy Manager.

 

Application User Guide: The Application User Guide describes the use and deployment of the Trusted RUBIX Application User mechanism. This mechanism extends the Attribute Based Access Control (ABAC) of the Security Policy Manager to external (e.g., Internet) users of Trusted RUBIX applications.