Trusted computer system
From Wikipedia, the free encyclopedia
A trusted computer system "employs sufficient hardware and software assurance measures to allow its use for simultaneous processing of a range of sensitive or classified information."[1]. They are originated and modified with trusted distribution of the trusted computing base (which includes the security kernel,) the latter of which the protective hardware and software is called. The trusted software may run trusted processes, but these are capable of violating system security (not that they usually should, since they perhaps also implement it.) At the terminal one connects to a trusted system with a trusted path and on the network with trusted identification forwarding.
[edit] see also
trusted computing base
Rainbow series
NCSC-TG-004 (Teal Green Book)
[edit] references
- ^ Glossary of Computer Security Terms, DoD NCSC-TG-004, 1988

