Trusted system concepts

نویسندگان

  • Marshall D. Abrams
  • Michael V. Joyce
چکیده

This is the first of three related papers exploring how contemporary computer architecture affects security. Key issues in this changing environment, such as distributed systems and the need to support multiple access control policies, necessitates a generalization of the Trusted Computing Base paradigm. This paper develops a conceptual framework with which to address the implications of the growing reliance on Policy-Enforcing Applications in distributed environments.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Legacy MLS/Trusted Systems and SELinux – concepts and comparisons to simplify migration and adoption

2 Orange Book labeled systems – background........................................................................................ 3 2.1 Department of Defense security ............................................................................................... 3 2.2 Separate trusted and commercial versions................................................................................ 4 2.3 ...

متن کامل

Privacy and Security in Open and Trusted Health Information Systems

The Open and Trusted Health Information Systems (OTHIS) Research Group has formed in response to the health sector’s privacy and security requirements for contemporary Health Information Systems (HIS). Due to recent research developments in trusted computing concepts, it is now both timely and desirable to move electronic HIS towards privacy-aware and security-aware applications. We introduce t...

متن کامل

New thinking about information technology security

This is the last of three related papers exploring how contemporary computer architecture affects security. It brings together the concepts introduced in the earlier papers and presents a generalized approach to protection, isolation, and access control. We call this approach the Generalized Trusted Computing Base. Based upon the “divide and conquer” approach to achieving protection, understand...

متن کامل

Trusted computing update

This is the second paper of a series of three related papers that examine contemporary information technology concepts. The first paper examined how the security community developed the accepted concepts and criteria, looked at changes currently ongoing, and provided insight into the driving forces and probable directions. This paper presents contemporary thinking about object management and su...

متن کامل

Trust in Peer-to-Peer Content Distribution Protocols

The distribution of virtual goods like multimedia data relies on the trustworthiness of the distribution system. Recent concepts for the distribution based on peer to peer networks like BitTorrent require new approaches to establish the needed level of trust in the overall functionality of the system. This paper explores the integration of hardware based trust concepts from the domain of Truste...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computers & Security

دوره 14  شماره 

صفحات  -

تاریخ انتشار 1995