Trusted system concepts
نویسندگان
چکیده
This is the first of three related papers exploring how contemporary computer architecture affects security. Key issues in this changing environment, such as distributed systems and the need to support multiple access control policies, necessitates a generalization of the Trusted Computing Base paradigm. This paper develops a conceptual framework with which to address the implications of the growing reliance on Policy-Enforcing Applications in distributed environments.
منابع مشابه
Legacy MLS/Trusted Systems and SELinux – concepts and comparisons to simplify migration and adoption
2 Orange Book labeled systems – background........................................................................................ 3 2.1 Department of Defense security ............................................................................................... 3 2.2 Separate trusted and commercial versions................................................................................ 4 2.3 ...
متن کاملPrivacy and Security in Open and Trusted Health Information Systems
The Open and Trusted Health Information Systems (OTHIS) Research Group has formed in response to the health sector’s privacy and security requirements for contemporary Health Information Systems (HIS). Due to recent research developments in trusted computing concepts, it is now both timely and desirable to move electronic HIS towards privacy-aware and security-aware applications. We introduce t...
متن کاملNew thinking about information technology security
This is the last of three related papers exploring how contemporary computer architecture affects security. It brings together the concepts introduced in the earlier papers and presents a generalized approach to protection, isolation, and access control. We call this approach the Generalized Trusted Computing Base. Based upon the “divide and conquer” approach to achieving protection, understand...
متن کاملTrusted computing update
This is the second paper of a series of three related papers that examine contemporary information technology concepts. The first paper examined how the security community developed the accepted concepts and criteria, looked at changes currently ongoing, and provided insight into the driving forces and probable directions. This paper presents contemporary thinking about object management and su...
متن کاملTrust in Peer-to-Peer Content Distribution Protocols
The distribution of virtual goods like multimedia data relies on the trustworthiness of the distribution system. Recent concepts for the distribution based on peer to peer networks like BitTorrent require new approaches to establish the needed level of trust in the overall functionality of the system. This paper explores the integration of hardware based trust concepts from the domain of Truste...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computers & Security
دوره 14 شماره
صفحات -
تاریخ انتشار 1995