Set of all computer components critical to its security
This article reads like a textbook. Please improve this article to make it neutral in tone and meet Wikipedia's quality standards.(February 2020)
Not to be confused with Trusted Computing.
The trusted computing base (TCB) of a computer system is the set of all hardware, firmware, and/or software components that are critical to its security, in the sense that bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system. By contrast, parts of a computer system that lie outside the TCB must not be able to misbehave in a way that would leak any more privileges than are granted to them in accordance to the system's security policy.
The careful design and implementation of a system's trusted computing base is paramount to its overall security. Modern operating systems strive to reduce the size of the TCB[not verified in body] so that an exhaustive examination of its code base (by means of manual or computer-assisted software audit or program verification) becomes feasible.
and 23 Related for: Trusted computing base information
enable trusted computing features in computers and mobile devices. Related efforts involved Trusted Network Connect, to bring trustedcomputing to network...
to make trust decisions. It complements Intel Management Engine. This technology is based on an industry initiative by the TrustedComputing Group (TCG)...
provers. The implementation of the underlying ML compiler adds to the trustedcomputingbase. Work on CakeML resulted in a formally verified ML compiler, alleviating...
against firmware attacks. Trusted Platform Module (TPM) was conceived by a computer industry consortium called TrustedComputing Group (TCG). It evolved...
concerning software security related bugs. It is based on the classical spiral model. Trustedcomputingbase Howard, Michael; Lipner, Steve (June 2006). The...
can be accessed. Hardware, firmware, and software elements of a trustedcomputingbase that implement the reference monitor concept. This article incorporates...
control block, a data structure in the operating system kernel Trustedcomputingbase, a set of computer components critical to its security Temenos Core...
such as Unix. The characteristic design philosophy is that a small trustedcomputingbase is of primary concern in a security-oriented OS. Genode can be used...
complex as well as error-prone. The Trusted Computer System Evaluation Criteria (TCSEC) concept of trustedcomputingbase (TCB) minimization is a far more...
trusted system is one that is relied upon to a specified extent to enforce a specified security policy. This is equivalent to saying that a trusted system...
of the signature). Direct Anonymous Attestation Double-spending Trustedcomputingbase Zissis, Dimitris; Lekkas, Dimitrios; Koutsabasis, Panayiotis (2012)...
completeness for reference monitors have been implemented in the TrustedComputingBase (TCB). Security Testing automatically generates test-case from the...
periodically notifies the watchdog subsystems Designing with a trustedcomputingbase (TCB) architecture ensures a highly secure and reliable system environment...
language C to executable machine code, taking the compiler out of the trustedcomputingbase of seL4. This implies that the high-level security proofs hold for...
provide required functionality. Minimality requires that a system's trustedcomputingbase (TCB) should be kept minimal. As the kernel (the code that executes...
Security Working Group considers such script to be part of the TrustedComputingBase implemented by the browser; however, it has been argued to the working...
microkernel are part of the trustedcomputingbase. If any of them fail, the system crashes. Nevertheless, reducing the trustedcomputingbase from 3-5 million lines...
computational trust is the generation of trusted authorities or user trust through cryptography. In centralised systems, security is typically based on the authenticated...
centralized computing exists when the majority of functions are carried out, or obtained from a remote centralized location. Decentralized computing is a trend...