... computer system - including hardware, firmware, and software - the combination of which is responsible for enforcing a security policy. A TCB consists of one or more components that together enforce a unified security policy over a product or system.... Glossary of Computer Security Terms - Page 491989 - 55 pagesFull view - About this book
| Computer networks - 1987 - 314 pages
...for enforcing a security policy ... the ability of a Trusted Computing Base to correctly enforce a security policy depends solely on the mechanisms within...system administrative personnel of parameters (eg, a users' clearance) related to the security policy." In particular, the TCB includes those mechanisms... | |
| Computers - 1994 - 304 pages
...for enforcing a security policy ... the ability of a Trusted Computing Base to correctly enforce a security policy depends solely on the mechanisms within...system administrative personnel of parameters (eg, a users' clearance) related to the security policy." In particular, the TCB includes those mechanisms... | |
| James N. Menendez - Computers - 1989 - 46 pages
...enforce a unified security policy over a product or system. The ability of a TCB to correctly enforce a security policy depends solely on the mechanisms within...administrative personnel of parameters (eg, a user's clearance) related to the security policy.[l] 1 . National Computer Security Center, DOD Trusted Computer System... | |
| Computers - 1988 - 36 pages
...enforce a unified security policy over a product or system. The ability of a TCB to correctly enforce a security policy depends solely on the mechanisms within...administrative personnel of parameters (eg, a user's clearance) related to the security policy. [7] REFERENCES 1. American National Standards Institute, Financial... | |
| Scott Wright - Computers - 1995 - 40 pages
...enforce a unified security policy over a product or system. The ability of a TCB to correctly enforce a security policy depends solely on the mechanisms within...administrative personnel of parameters (eg, a user's clearance) related to the security policy. [7] REFERENCES 1. American National Standards Institute, Financial... | |
| 1995 - 44 pages
...correctly enforce a security policy depends solely on the mechanisms within the Trusted Computing Base and on the correct input by system administrative...user's clearance level) related to the security policy. [9] REFERENCES 1. Bell, DE, and LJ La Padula, "Secure Computer System: Unified Exposition and Multics... | |
| Electronic data processing documentation - 1988 - 44 pages
...correctly enforce a security policy depends solely on the mechanisms within the Trusted Computing Base and on the correct input by system administrative...a user's clearance level) related to the security policy.[9] UMVER8TTY OF MtCHKUN llllllllllllllllll III! Ill 1111 REFERENCES 3 9015 02890 7072 1. Bell,... | |
| Electronic data processing departments - 1990 - 64 pages
...required for a trusted computer system. The ability of a trusted computing base to correctly enforce a security policy depends solely on the mechanisms within...administrative personnel of parameters (eg, a user's clearance) related to the security policy. Trusted Path A mechanism by which a person at a terminal can communicate... | |
| Virgil D. Gligor - Computers - 1994 - 68 pages
...security. For example, making a "blind copy" of a sensitive file for the creator of the Trojan Horse. TRUSTED COMPUTING BASE (TCB) The totality of protection...user's clearance level) related to the security policy. USER Person or process accessing an Automated lnformation System either by direct connections (ie,... | |
| Computer security - 1991 - 40 pages
...additional user services required for a trusted computer system. The ability of a TCB to correctly enforce a security policy depends solely on the mechanisms within...administrative personnel of parameters (eg, a user's clearance) related to the security policy. TRUSTED PATH A mechanism by which a person at a terminal can communicate... | |
| |