Is the Trusted Computing Base Concept Fundamentally Flawed?

نویسنده

  • John D. McLean
چکیده

This debate was conceived by Carl Landwehr, who asked me to serve as moderator. The proposition under discussion was first put forward by Bill Wulf in the JavaSoft Forum 1.1 (http://java.sun.com/forum/securityForum.html). Wulf objects to the JavaSoft security model, which aims to protect user files, network connections! and other resources from malicious applets by restricting applets to executing in a “sandbox”. Wulf states:

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mobile Ad Hoc Networks (MANETs) Are Not A Fundamentally Flawed Architecture

Millions of people nowadays have portable computers and they generally want to read their e-mail and access their normal file systems wherever in the world they may be. This demand for mobility has fueled the rapid progression of computer & communication technologies from networks consisting of both stationary hosts & routers, to networks consisting of mobile hosts and stationary routers, and m...

متن کامل

Mobile Ad Hoc Networks (MANETs) Are Not A Fundamentally Flawed Architecture

Millions of people nowadays have portable computers and they generally want to read their e-mail and access their normal file systems wherever in the world they may be. This demand for mobility has fueled the rapid progression of computer & communication technologies from networks consisting of both stationary hosts & routers, to networks consisting of mobile hosts and stationary routers, and m...

متن کامل

Death , Taxes , and Imperfect Software : Surviving the Inevitable 1

A security system is only as strong as its weakest link. This observation lead to security architectures that use a small trusted computing base (TCB) to minimize the number of “links” in the system. A small TCB both reduces the chance of a bug occurring by reducing the volume of software that may contain a bug, and also makes formal verification of the correctness of the TCB feasible. Unfortun...

متن کامل

Death, Taxes, and Imperfect Software: Surviving the Inevitable

A security system is only as strong as its weakest link. This observation lead to security architectures that use a small trusted computing base (TCB) to minimize the number of “links” in the system. A small TCB both reduces the chance of a bug occurring by reducing the volume of software that may contain a bug, and also makes formal verification of the correctness of the TCB feasible. Unfortun...

متن کامل

Trusted computing update

This is the second paper of a series of three related papers that examine contemporary information technology concepts. The first paper examined how the security community developed the accepted concepts and criteria, looked at changes currently ongoing, and provided insight into the driving forces and probable directions. This paper presents contemporary thinking about object management and su...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997