security kernel


Also found in: Wikipedia.

security kernel

[si′kyu̇r·əd·ē ‚kər·nəl]
(computer science)
A portion of an operating system into which all security-related functions have been concentrated, forming a small, certifiably secure nucleus which is separate from the rest of the system.

security kernel

The part of the operating system that grants access to users of the computer system.
References in periodicals archive ?
His areas of interest and research include Interoperability Management Theory, interculture, cultural security, comparative transfer analyses (of human exchange dynamics), the quantum leadership domain, the hierarchy of knowledge, the problems and advantages of locality, the Enterprise Security Kernel, and the sustainability of cultures, among others.
The Americans have developed a "security kernel" technology for solving their problem, but we need not be concerned--they recently discontinued work on this technology.
However, it will trace the outlines of the computer security problem and show how the security kernel approach meets the requirements for a workable solution--although recent termination has nipped in the bud very promising work toward a solution.
Recent logically rigorous work has resulted in a security kernel technology.
The security kernel approach, which is subject to such methodical technical analysis, will also be discussed.
A major step toward solution was the introduction in 1972 of the security kernel (17) technology, which provided a scientific foundation for demonstrably effective internal security controls.
Of the software in the system, only the security kernel ...
A security kernel is a small set of computer program instructions and associated hardware that controls all access by users (viz., through their programs) to information.
Security kernel design is derived directly from a precise specification (viz., a mathematical model) of its function.
The chief distinguishing characteristic (from whence its name) of the security kernel concept is that a kernel represents a distinct internal security perimeter.
To better understand kernel mode rootkits let's take a look at the basic principles of the security kernel architecture used in Windows NT/2000/XP platform design.
In the security community, efforts focused on properties of multilevel security kernels and supposedly small trusted computing bases have had some success in formalizing requirements and encouraging improved system architectures.