• DocumentCode
    3207502
  • Title

    Some weaknesses of the TCB model

  • Author

    Blakley, B. ; Kienzle, D.M.

  • Author_Institution
    Int. Bus. Machines Corp., Austin, TX, USA
  • fYear
    1997
  • fDate
    4-7 May 1997
  • Firstpage
    3
  • Lastpage
    5
  • Abstract
    This paper summarizes the affirmative argument supporting the proposition that “the concept of the trusted computing base (TCB) as a basis for constructing systems to meet security requirements is fundamentally flawed and should no longer be used to justify system security architectures”
  • Keywords
    information systems; security of data; TCB model weaknesses; security requirements; system security architectures; systems construction; trusted computing base; Access control; Authentication; Environmental economics; Information security; Information systems; Operating systems; Personnel; Physics computing; Production systems; Protection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security and Privacy, 1997. Proceedings., 1997 IEEE Symposium on
  • Conference_Location
    Oakland, CA
  • ISSN
    1081-6011
  • Print_ISBN
    0-8186-7828-3
  • Type

    conf

  • DOI
    10.1109/SECPRI.1997.601305
  • Filename
    601305