DocumentCode :
3207502
Title :
Some weaknesses of the TCB model
Author :
Blakley, B. ; Kienzle, D.M.
Author_Institution :
Int. Bus. Machines Corp., Austin, TX, USA
fYear :
1997
fDate :
4-7 May 1997
Firstpage :
3
Lastpage :
5
Abstract :
This paper summarizes the affirmative argument supporting the proposition that “the concept of the trusted computing base (TCB) as a basis for constructing systems to meet security requirements is fundamentally flawed and should no longer be used to justify system security architectures”
Keywords :
information systems; security of data; TCB model weaknesses; security requirements; system security architectures; systems construction; trusted computing base; Access control; Authentication; Environmental economics; Information security; Information systems; Operating systems; Personnel; Physics computing; Production systems; Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy, 1997. Proceedings., 1997 IEEE Symposium on
Conference_Location :
Oakland, CA
ISSN :
1081-6011
Print_ISBN :
0-8186-7828-3
Type :
conf
DOI :
10.1109/SECPRI.1997.601305
Filename :
601305
Link To Document :
بازگشت