Title :
Some weaknesses of the TCB model
Author :
Blakley, B. ; Kienzle, D.M.
Author_Institution :
Int. Bus. Machines Corp., Austin, TX, USA
Abstract :
This paper summarizes the affirmative argument supporting the proposition that “the concept of the trusted computing base (TCB) as a basis for constructing systems to meet security requirements is fundamentally flawed and should no longer be used to justify system security architectures”
Keywords :
information systems; security of data; TCB model weaknesses; security requirements; system security architectures; systems construction; trusted computing base; Access control; Authentication; Environmental economics; Information security; Information systems; Operating systems; Personnel; Physics computing; Production systems; Protection;
Conference_Titel :
Security and Privacy, 1997. Proceedings., 1997 IEEE Symposium on
Conference_Location :
Oakland, CA
Print_ISBN :
0-8186-7828-3
DOI :
10.1109/SECPRI.1997.601305