{"title":"A trust model of TCB subsets","authors":"Yong Li, Xing Zhang","doi":"10.1109/ICMLC.2010.5580768","DOIUrl":null,"url":null,"abstract":"The traditional TCB is considered of working on system layer, while TCB in modern imformation system has extended to application layer. As keeping TCB trusted is one of the preconditions of ensuring information system security, it is necessary to study the trust attributes of extended TCB. In this paper, TCB is compartmentalized into TCB subsets according to the hierarchical structure of policy. Time-isolation relation and space-isolation relation are used to discrib the relations among TCB subsets. Based on the trusted-supporting relations, a theorem is brought forward and proved which gives the conditions to ensure the extended TCB trusted. At the end of this paper, an exemple is given to illuminate that access control mechanisms based on this model can provide more nice-granular control to enhance the security of system.","PeriodicalId":126080,"journal":{"name":"2010 International Conference on Machine Learning and Cybernetics","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Machine Learning and Cybernetics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMLC.2010.5580768","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The traditional TCB is considered of working on system layer, while TCB in modern imformation system has extended to application layer. As keeping TCB trusted is one of the preconditions of ensuring information system security, it is necessary to study the trust attributes of extended TCB. In this paper, TCB is compartmentalized into TCB subsets according to the hierarchical structure of policy. Time-isolation relation and space-isolation relation are used to discrib the relations among TCB subsets. Based on the trusted-supporting relations, a theorem is brought forward and proved which gives the conditions to ensure the extended TCB trusted. At the end of this paper, an exemple is given to illuminate that access control mechanisms based on this model can provide more nice-granular control to enhance the security of system.