Is the Trusted Computing Base Concept Fundamentally Flawed?
نویسنده
چکیده
This debate was conceived by Carl Landwehr, who asked me to serve as moderator. The proposition under discussion was first put forward by Bill Wulf in the JavaSoft Forum 1.1 (http://java.sun.com/forum/securityForum.html). Wulf objects to the JavaSoft security model, which aims to protect user files, network connections! and other resources from malicious applets by restricting applets to executing in a “sandbox”. Wulf states:
منابع مشابه
Mobile Ad Hoc Networks (MANETs) Are Not A Fundamentally Flawed Architecture
Millions of people nowadays have portable computers and they generally want to read their e-mail and access their normal file systems wherever in the world they may be. This demand for mobility has fueled the rapid progression of computer & communication technologies from networks consisting of both stationary hosts & routers, to networks consisting of mobile hosts and stationary routers, and m...
متن کاملMobile Ad Hoc Networks (MANETs) Are Not A Fundamentally Flawed Architecture
Millions of people nowadays have portable computers and they generally want to read their e-mail and access their normal file systems wherever in the world they may be. This demand for mobility has fueled the rapid progression of computer & communication technologies from networks consisting of both stationary hosts & routers, to networks consisting of mobile hosts and stationary routers, and m...
متن کاملDeath , Taxes , and Imperfect Software : Surviving the Inevitable 1
A security system is only as strong as its weakest link. This observation lead to security architectures that use a small trusted computing base (TCB) to minimize the number of “links” in the system. A small TCB both reduces the chance of a bug occurring by reducing the volume of software that may contain a bug, and also makes formal verification of the correctness of the TCB feasible. Unfortun...
متن کاملDeath, Taxes, and Imperfect Software: Surviving the Inevitable
A security system is only as strong as its weakest link. This observation lead to security architectures that use a small trusted computing base (TCB) to minimize the number of “links” in the system. A small TCB both reduces the chance of a bug occurring by reducing the volume of software that may contain a bug, and also makes formal verification of the correctness of the TCB feasible. Unfortun...
متن کاملTrusted computing update
This is the second paper of a series of three related papers that examine contemporary information technology concepts. The first paper examined how the security community developed the accepted concepts and criteria, looked at changes currently ongoing, and provided insight into the driving forces and probable directions. This paper presents contemporary thinking about object management and su...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997