DocumentCode :
3381690
Title :
Considerations on TCB subsetting
Author :
Winkler-Parenty, Helena B.
fYear :
1989
fDate :
4-8 Dec 1989
Firstpage :
105
Lastpage :
106
Abstract :
The hierarchical trusted computing base (TCB) subsetting architecture, which is intended to allow database management systems (DBMSs) to take advantage of the effort expended in producing and evaluating trusted multilevel operating systems, is discussed. The advantages and disadvantages that result from the use of this security architecture are explored. Another architecture, functional modularization of a TCB, is presented. This architecture gives the DBMS much greater control over its security policy and resource management than the TCB subsetting approach, allowing the fuller functionality and performance
Keywords :
computer architecture; database management systems; operating systems (computers); security of data; database management systems; functional modularization; functionality; multilevel operating systems; resource management; security architecture; trusted computing base subsetting; Buildings; Data security; Database systems; Degradation; Maintenance engineering; Operating systems; Protection; Resource management; Taxonomy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 1989., Fifth Annual
Conference_Location :
Tucson, AZ
Print_ISBN :
0-8186-2006-4
Type :
conf
DOI :
10.1109/CSAC.1989.81036
Filename :
81036
Link To Document :
بازگشت