> The grey book explains the security guy's study of > mapping ACLs to unix permission bits. It's wordy > and boring, but they did a very **thorough** job. i'm afraid to say that that's the only approach that can be taken. > Aha! found it on-line: > http://www.fas.org/irp/nsa/rainbow/tg020-a.htm yesssss, thank you.