Trusted computing base: Difference between revisions

Content deleted Content added
m Trusted vs. trustworthy: Added link to trusted system page
Line 95:
 
==Examples==
[[AIX operating system|AIX]] materializes the trusted computing base as an optional component in its install-time package management system.<ref>[httphttps://wwwweb.archive.org/web/20160624012547if_/redbooks.ibm.com/pubs/pdfs/redbooks/sg245962.pdf AIX 4.3 Elements of Security], August 2000, chapter 6.</ref>
 
==See also==