TRUSTED SYSTEM CONCEPTS

被引:16
作者
ABRAMS, MD
JOYCE, MV
机构
[1] The MITRE Corporation, McLean, VA 22102
关键词
COMPUTER ARCHITECTURE; SECURITY; DISTRIBUTED SYSTEMS; ACCESS CONTROL; POLICY; TRUSTED COMPUTING BASE; APPLICATIONS; SEPARATION;
D O I
10.1016/0167-4048(95)97025-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This is the first of three related papers exploring how contemporary computer architecture affects security. Key issues in this changing environment, such as distributed systems and the need to support multiple access control policies, necessitate a generalization of the Trusted Computing Base paradigm. This paper develops a conceptual framework with which to address the implications of the growing reliance on Policy-Enforcing Applications in distributed environments.
引用
收藏
页码:45 / 56
页数:12
相关论文
共 51 条
[31]  
RUSHBY J, 1984, 7TH DOD NBS COMP SEC, P294
[32]   PROTECTION OF INFORMATION IN COMPUTER SYSTEMS [J].
SALTZER, JH ;
SCHROEDER, MD .
PROCEEDINGS OF THE IEEE, 1975, 63 (09) :1278-1308
[33]  
SANDHU RS, 1993, IEEE COMPUTER NOV, P9
[34]  
SANDHU RS, 1992, 15TH P NAT COMP SEC, P221
[35]  
SANDHU RS, 1993, HDB INFORMATION SECU
[36]  
SHIREY LJ, 1981, P S SECURITY PRIVACY
[37]  
SHOCKLEY WR, 1987, 3RD P AER COMP SEC C
[38]  
STERNE DF, 1994, P WORKSHOP FUNDAMENT
[39]   REFLECTIONS ON TRUSTING TRUST [J].
THOMPSON, K .
COMMUNICATIONS OF THE ACM, 1984, 27 (08) :761-763
[40]  
VAZQUEZGOMEZ J, 1994, COMPUTERS SECURI APR