Title :
Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products
Author :
Schaefer, Marvin ; Schell, Roger R.
Author_Institution :
DoD Computer Security Center
fDate :
April 29 1984-May 2 1984
Abstract :
It has been a tenet of the computer security research and development community that policy enforcement mechanisms must be designed into systems at the time of their conception rather than retrofitted on to existing systems. The paper examines what it means for an architecture to be extensible with respect to security. Results are shown of an examination of the Trusted Computer System Evaluation Criteria\´s requirements in order to try to make a clear distinction based on how "fundamental" each is to the design and implementation of systems in the individual evaluation classes. We note that, given strict hierarchical layering in a system, along with a strict integrity policy mechanism such as the ring mechanism, it should be possible to extend a system through the addition of new adjacent domains.
Keywords :
Access control; Computer architecture; Computers; Hardware; Kernel; Monitoring;
Conference_Titel :
Security and Privacy, 1984 IEEE Symposium on
Conference_Location :
Oakland, CA, USA
Print_ISBN :
0-8186-0532-4
DOI :
10.1109/SP.1984.10024