NEW THINKING ABOUT INFORMATION TECHNOLOGY SECURITY

被引:3
作者
ABRAMS, MD
JOYCE, MV
机构
[1] The MITRE Corporation, McLean, VA 22102
关键词
COMPUTER ARCHITECTURE; SECURITY; DISTRIBUTED SYSTEMS; ACCESS CONTROL; POLICY; TRUSTED COMPUTING BASE; APPLICATIONS; SEPARATION;
D O I
10.1016/0167-4048(95)97027-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This is the last of three related papers exploring how contemporary computer architecture affects security. It brings together the concepts introduced in the earlier papers and presents a generalized approach to protection, isolation, and access control. We call this approach the Generalized Trusted Computing Base. Based upon the 'divide and conquer' approach to achieving protection, understandability, and flexibility, the result is a more flexible solution than the rigid hierarchical organization identified in the Trusted Database Interpretation or the partitioning introduced in the Trusted Network Interpretation.
引用
收藏
页码:69 / 81
页数:13
相关论文
共 21 条
[1]  
ABRAMS MD, 1991, 14TH P NAT COMP SEC
[2]  
ABRAMS MD, 1993, 9TH P INF SEC C
[3]  
ABRAMS MD, 1992, 15TH P NAT COMP SEC
[4]  
ABRAMS MD, 1990, 13TH P NAT COMP SEC
[5]  
ANDERSON JP, 1972, AD758206, V1
[6]  
BOEBERT WE, 1988, 11TH P NAT COMP SEC
[7]  
GOLD BD, 1984, P IEEE S SECURITY PR
[8]  
GRAFF J, 1992, 15TH P NAT COMP SEC, P631
[9]  
Karger P. A., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P2, DOI 10.1109/RISP.1990.63834
[10]  
Kelem N. L., 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.91CH2986-8), P78, DOI 10.1109/RISP.1991.130776