A Comparison of the trusted Computing Group Security Model with Clark-Wilson
نویسنده
چکیده
Computer security designers and evaluators have relied on security models such as Clark-Wilson, Biba and BellLaPadula to better ensure secure computer system behavior meets expectations. The Trusted Computing Group (TCG) is a cross-industry organization focused on delivering security technology and building blocks for mainstream computers. A comparison of the TCG security model to the ClarkWilson model; a well-known model in industry and academia can be helpful in identifying similarities and differences that sheds additional insight on expected behavior of TCG compliant computing devices.
منابع مشابه
GTrust: a group based trust model
Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this kind of trust, which is based on personal experiences, is its limited domain. Moreover, both par...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملTowards an Open Trusted Computing Framework
A trusted computing framework attempts to provide high levels of assurance for general purpose computation. Trusted computing, still a maturing research field, currently provides four security primitives — attestation, sealed storage, curtained memory and secure I/O. To provide high assurance levels amongst distributed, autonomous systems, trusted computing frameworks treat a machine owner as a...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملToward Automated Information-Flow Integrity Verification for Security-Critical Applications
We provide a largely automated system for verifying ClarkWilson interprocess information-flow integrity. Information-flow integrity properties are essential to isolate trusted processes from untrusted ones, but system misconfiguration can easily create insecure dependences. For example, an untrusted user process may be able to write to sshd config via a cron script. A useful notion of integrity...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004