Content deleted Content added
m Task 18 (cosmetic): eval 2 templates: del empty params (1×); hyphenate params (2×); |
→Definition and characterization: Disambiguate Kernel (computing). |
||
Line 17:
| year = 1981
| ___location = Pacific Grove, California, US
}}</ref> who defined it as the combination of [[
In the classic paper ''Authentication in Distributed Systems: Theory and Practice''<ref>B. Lampson, M. Abadi, M. Burrows and E. Wobber, [http://citeseer.ist.psu.edu/lampson92authentication.html Authentication in Distributed Systems: Theory and Practice], [[ACM Transactions on Computer Systems]] 1992, on page 6.</ref> [[Butler Lampson|Lampson]] et al. define the TCB of a [[computer system]] as simply
: ''a small amount of software and hardware that security depends on and that we distinguish from a much larger amount that can misbehave without affecting security.''
Line 31:
: ''<nowiki>[t]</nowiki>he ability of a trusted computing base to enforce correctly a unified security policy depends on the correctness of the mechanisms within the trusted computing base, the protection of those mechanisms to ensure their correctness, and the correct input of parameters related to the security policy.''
In other words, a given piece of hardware or software is a part of the TCB if and only if it has been designed to be a part of the mechanism that provides its security to the computer system. In [[operating system]]s, this typically consists of the
==Properties==
|