DocumentCode
3207502
Title
Some weaknesses of the TCB model
Author
Blakley, B. ; Kienzle, D.M.
Author_Institution
Int. Bus. Machines Corp., Austin, TX, USA
fYear
1997
fDate
4-7 May 1997
Firstpage
3
Lastpage
5
Abstract
This paper summarizes the affirmative argument supporting the proposition that “the concept of the trusted computing base (TCB) as a basis for constructing systems to meet security requirements is fundamentally flawed and should no longer be used to justify system security architectures”
Keywords
information systems; security of data; TCB model weaknesses; security requirements; system security architectures; systems construction; trusted computing base; Access control; Authentication; Environmental economics; Information security; Information systems; Operating systems; Personnel; Physics computing; Production systems; Protection;
fLanguage
English
Publisher
ieee
Conference_Titel
Security and Privacy, 1997. Proceedings., 1997 IEEE Symposium on
Conference_Location
Oakland, CA
ISSN
1081-6011
Print_ISBN
0-8186-7828-3
Type
conf
DOI
10.1109/SECPRI.1997.601305
Filename
601305
Link To Document