DocumentCode :
3381904
Title :
TCB subset architecture
Author :
Vetter, Linda L.
fYear :
1989
fDate :
4-8 Dec 1989
Firstpage :
107
Abstract :
The advantages of using TCB (trusted computing base) subset architecture in designing secure RDBMS (relational database management system) products are described. These advantages include ease of evaluation, portability, full operating system features, performance, standards, and assurance. TCB subset architecture extends the existing security mechanisms of a secure operating system with complementary mechanisms within the RDBMS. There is a clear distinction between the RDBMS portion of the TCB and the operating system and hardware portions of the TCB on which the RDBMS runs: the RDBMS implements RDBMS-specific aspects of the security policy without violating the security policy of the secure operating system base
Keywords :
computer architecture; operating systems (computers); relational databases; security of data; TCB subset architecture; performance; portability; relational database management system; secure RDBMS; secure operating system; security mechanisms; standards; trusted computing base; ANSI standards; Availability; Computer architecture; Data security; Hardware; Kernel; Operating systems; Relational databases; Supercomputers; Workstations;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 1989., Fifth Annual
Conference_Location :
Tucson, AZ
Print_ISBN :
0-8186-2006-4
Type :
conf
DOI :
10.1109/CSAC.1989.81037
Filename :
81037
Link To Document :
بازگشت