Title :
Considerations on TCB subsetting
Author :
Winkler-Parenty, Helena B.
Abstract :
The hierarchical trusted computing base (TCB) subsetting architecture, which is intended to allow database management systems (DBMSs) to take advantage of the effort expended in producing and evaluating trusted multilevel operating systems, is discussed. The advantages and disadvantages that result from the use of this security architecture are explored. Another architecture, functional modularization of a TCB, is presented. This architecture gives the DBMS much greater control over its security policy and resource management than the TCB subsetting approach, allowing the fuller functionality and performance
Keywords :
computer architecture; database management systems; operating systems (computers); security of data; database management systems; functional modularization; functionality; multilevel operating systems; resource management; security architecture; trusted computing base subsetting; Buildings; Data security; Database systems; Degradation; Maintenance engineering; Operating systems; Protection; Resource management; Taxonomy;
Conference_Titel :
Computer Security Applications Conference, 1989., Fifth Annual
Conference_Location :
Tucson, AZ
Print_ISBN :
0-8186-2006-4
DOI :
10.1109/CSAC.1989.81036