DocumentCode :
2561656
Title :
Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products
Author :
Schaefer, Marvin ; Schell, Roger R.
Author_Institution :
DoD Computer Security Center
fYear :
1984
fDate :
April 29 1984-May 2 1984
Firstpage :
41
Lastpage :
41
Abstract :
It has been a tenet of the computer security research and development community that policy enforcement mechanisms must be designed into systems at the time of their conception rather than retrofitted on to existing systems. The paper examines what it means for an architecture to be extensible with respect to security. Results are shown of an examination of the Trusted Computer System Evaluation Criteria\´s requirements in order to try to make a clear distinction based on how "fundamental" each is to the design and implementation of systems in the individual evaluation classes. We note that, given strict hierarchical layering in a system, along with a strict integrity policy mechanism such as the ring mechanism, it should be possible to extend a system through the addition of new adjacent domains.
Keywords :
Access control; Computer architecture; Computers; Hardware; Kernel; Monitoring;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy, 1984 IEEE Symposium on
Conference_Location :
Oakland, CA, USA
ISSN :
1540-7993
Print_ISBN :
0-8186-0532-4
Type :
conf
DOI :
10.1109/SP.1984.10024
Filename :
6234809
Link To Document :
بازگشت