{"title":"TCB子集体系结构","authors":"Linda L. Vetter","doi":"10.1109/CSAC.1989.81037","DOIUrl":null,"url":null,"abstract":"The advantages of using TCB (trusted computing base) subset architecture in designing secure RDBMS (relational database management system) products are described. These advantages include ease of evaluation, portability, full operating system features, performance, standards, and assurance. TCB subset architecture extends the existing security mechanisms of a secure operating system with complementary mechanisms within the RDBMS. There is a clear distinction between the RDBMS portion of the TCB and the operating system and hardware portions of the TCB on which the RDBMS runs: the RDBMS implements RDBMS-specific aspects of the security policy without violating the security policy of the secure operating system base.<<ETX>>","PeriodicalId":284420,"journal":{"name":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"TCB subset architecture\",\"authors\":\"Linda L. Vetter\",\"doi\":\"10.1109/CSAC.1989.81037\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The advantages of using TCB (trusted computing base) subset architecture in designing secure RDBMS (relational database management system) products are described. These advantages include ease of evaluation, portability, full operating system features, performance, standards, and assurance. TCB subset architecture extends the existing security mechanisms of a secure operating system with complementary mechanisms within the RDBMS. There is a clear distinction between the RDBMS portion of the TCB and the operating system and hardware portions of the TCB on which the RDBMS runs: the RDBMS implements RDBMS-specific aspects of the security policy without violating the security policy of the secure operating system base.<<ETX>>\",\"PeriodicalId\":284420,\"journal\":{\"name\":\"[1989 Proceedings] Fifth Annual Computer Security Applications Conference\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1989-12-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"[1989 Proceedings] Fifth Annual Computer Security Applications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSAC.1989.81037\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSAC.1989.81037","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The advantages of using TCB (trusted computing base) subset architecture in designing secure RDBMS (relational database management system) products are described. These advantages include ease of evaluation, portability, full operating system features, performance, standards, and assurance. TCB subset architecture extends the existing security mechanisms of a secure operating system with complementary mechanisms within the RDBMS. There is a clear distinction between the RDBMS portion of the TCB and the operating system and hardware portions of the TCB on which the RDBMS runs: the RDBMS implements RDBMS-specific aspects of the security policy without violating the security policy of the secure operating system base.<>