By Topic

Integrating cryptography in the trusted computing base

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Roe, M. ; Comput. Lab., Cambridge Univ., UK ; Casey, T.

Secure distributed systems are not easily constructed, as they combine mechanisms based on very different theories of security (encryption and reference monitors). The authors show how these mechanisms may be integrated via the Unix STREAMS mechanism Examples are given of how this architecture can support existing security protocols and it is shown why it is consistent with the Bell-LaPadula and Biba information-flow models

Published in:

Computer Security Applications Conference, 1990., Proceedings of the Sixth Annual

Date of Conference:

3-7 Dec 1990