Trusted Process Classes

@inproceedings{Steffan1996TrustedPC,
  title={Trusted Process Classes},
  author={William L. Steffan},
  year={1996}
}
Vendors who develop Trusted Computing Base (TCB) equipped secure operating systems face difficult choices as they design and implement the requisite protection features appropriate to the evaluation class being targeted (e.g., Labeled Security Protection, Class B1). On the one hand, vendors seek to meet each and every evaluation class requirement unconditionally, being careful to limit every possible opportunity for latent vulnerabilities to occur. However, on the other hand, vendors must not… CONTINUE READING