Some weaknesses of the TCB model

  • Authors:
  • B. Blakley;D. M. Kienzle

  • Affiliations:
  • -;-

  • Venue:
  • SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
  • Year:
  • 1997

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper summarizes the affirmative argument supporting the proposition that "the concept of the trusted computing base (TCB) as a basis for constructing systems to meet security requirements is fundamentally flawed and should no longer be used to justify system security architectures".