Jump to content

Trusted computing base

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by 213.253.39.122 (talk) at 00:37, 26 February 2002 (from Federal Standard 1037C). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

trusted computing base (TCB): [The] totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy.

Note: The ability of a trusted computing base to enforce correctly a unified security policy depends on the correctness of the mechanisms within the trusted computing base, the protection of those mechanisms to ensure their correctness, and the correct input of parameters related to the security policy.

Source: from Federal Standard 1037C and from the National Information Systems Security Glossary