{"title":"Considerations on TCB subsetting","authors":"Helena B. Winkler-Parenty","doi":"10.1109/CSAC.1989.81036","DOIUrl":null,"url":null,"abstract":"The hierarchical trusted computing base (TCB) subsetting architecture, which is intended to allow database management systems (DBMSs) to take advantage of the effort expended in producing and evaluating trusted multilevel operating systems, is discussed. The advantages and disadvantages that result from the use of this security architecture are explored. Another architecture, functional modularization of a TCB, is presented. This architecture gives the DBMS much greater control over its security policy and resource management than the TCB subsetting approach, allowing the fuller functionality and performance.<<ETX>>","PeriodicalId":284420,"journal":{"name":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSAC.1989.81036","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The hierarchical trusted computing base (TCB) subsetting architecture, which is intended to allow database management systems (DBMSs) to take advantage of the effort expended in producing and evaluating trusted multilevel operating systems, is discussed. The advantages and disadvantages that result from the use of this security architecture are explored. Another architecture, functional modularization of a TCB, is presented. This architecture gives the DBMS much greater control over its security policy and resource management than the TCB subsetting approach, allowing the fuller functionality and performance.<>