I also spent a couple of hours fighting with Alta Vista looking for relevant
documents and didn't find very much. Any other suggestions?
Seriously, I doubt you'll find that anyone has sat down and documented
this aspect of the system specifically. If you want to study the
security implementation in detail, the sources remain the first and
foremost resource. In fact, they probably represent the ONLY resource.
in a nutshell, the security model is
"you must have permission to do something".
the superuser (aka root: uid 0) is can do anything.
command audit trail (logging) is not provided.
the holes have been in the implementation of that model.
the source shows the implementation. which has been of greatly
varying quality regarding security. ;(