trusted computing base
Also found in: Medical, Acronyms, Wikipedia.
trusted computing base
Everything that causes a computer system or network to be devoid of malicious software or hardware. Maintaining the trusted computing base (TCB) is essential for security policy to be implemented successfully. See known-good software, TCG, NCSC and NGSCB.Copyright © 1981-2025 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive
Ten years ago, who would have thought a word processor should be part of the
trusted computing base? There is no way to be assured of the security of such a complex component; the only possible solutions are to split off the security-sensitive pieces into small, auditable modules, or to provide new operating system primitives that will have the same effect.
In the security community, efforts focused on properties of multilevel security kernels and supposedly small
trusted computing bases have had some success in formalizing requirements and encouraging improved system architectures.
Copyright © 2003-2025 Farlex, Inc
Disclaimer
All content on this website, including dictionary, thesaurus, literature, geography, and other reference data is for informational purposes only. This information should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional.