Browse Wiki & Semantic Web

Jump to: navigation, search
Http://dbpedia.org/resource/Trusted computing base
  This page has no properties.
hide properties that link here 
  No properties link to this page.
 
http://dbpedia.org/resource/Trusted_computing_base
http://dbpedia.org/ontology/abstract 可信计算基(英語:Trusted computing base, TCB)是指为实现可信计算基(英語:Trusted computing base, TCB)是指为实现计算机系统安全保护的所有安全保护机制的集合,机制可以硬件、固件和软件的形式出现。一旦可信计算机基的某个构件出现程序错误或者安全隐患,就对整个系统的安全造成危害。 与之相反,如果除可信计算基之外的系统的其他部分出现问题,也只是泄漏了系统安全策略赋予它们的相关权限而已,这些权限一般都是比较低的。 精心设计和实现的系统可信计算基对系统整体安全至关重要。现代操作系统努力降低TCB的大小,使得通过手工或电脑辅助软件审计()或形式化验证的方法对其代码库彻底的检查成为可能。,使得通过手工或电脑辅助软件审计()或形式化验证的方法对其代码库彻底的检查成为可能。 , Una Base de computador confiable, también Una Base de computador confiable, también conocido por las siglas TCB (del inglés Trusted Computer Base), es un conjunto de elementos hardware, firmware y software que permiten a un sistema informático implementar los requisitos de seguridad establecidos. Cualquier cosa fuera del TCB puede ser malicioso.​​ En ordenadores de propósito general la TCB suele estar formada por la mayoría de los elementos hardware del sistema (excepto los dispositivos de E/S) y una parte del núcleo del sistema operativo. Entre las funciones del sistema operativo que se deben incluir dentro de la TCB se encuentran las relativas a creación de procesos, cambio de contexto, gestión de memoria y parte de la gestión de la E/S y del sistema de archivos.​ Siempre se quiere que la TCB sea lo más pequeña posible de forma que nos podamos centrar en asegurar la seguridad de esa pequeña parte y que la seguridad del resto del sistema se apoye en ella.ad del resto del sistema se apoye en ella. , The trusted computing base (TCB) of a compThe trusted computing base (TCB) of a computer system is the set of all hardware, firmware, and/or software components that are critical to its security, in the sense that bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system. By contrast, parts of a computer system that lie outside the TCB must not be able to misbehave in a way that would leak any more privileges than are granted to them in accordance to the system's security policy. The careful design and implementation of a system's trusted computing base is paramount to its overall security. Modern operating systems strive to reduce the size of the TCB so that an exhaustive examination of its code base (by means of manual or computer-assisted software audit or program verification) becomes feasible.or program verification) becomes feasible.
http://dbpedia.org/ontology/wikiPageExternalLink http://ssrg.nicta.com.au/projects/seL4/ +
http://dbpedia.org/ontology/wikiPageID 41826
http://dbpedia.org/ontology/wikiPageLength 12720
http://dbpedia.org/ontology/wikiPageRevisionID 1116356882
http://dbpedia.org/ontology/wikiPageWikiLink http://dbpedia.org/resource/Web_server + , http://dbpedia.org/resource/Operating_system + , http://dbpedia.org/resource/Java_%28programming_language%29 + , http://dbpedia.org/resource/John_Rushby + , http://dbpedia.org/resource/Operating_system_kernel + , http://dbpedia.org/resource/Open_Kernel_Labs + , http://dbpedia.org/resource/Supervisor_mode + , http://dbpedia.org/resource/Von_Neumann_architecture + , http://dbpedia.org/resource/L4_microkernel + , http://dbpedia.org/resource/NICTA + , http://dbpedia.org/resource/E_%28programming_language%29 + , http://dbpedia.org/resource/Computer_security + , http://dbpedia.org/resource/Security_breach + , http://dbpedia.org/resource/Access_control + , http://dbpedia.org/resource/Program_verification + , http://dbpedia.org/resource/Microkernel + , http://dbpedia.org/resource/Multi-user + , http://dbpedia.org/resource/Category:Computer_security_procedures + , http://dbpedia.org/resource/Memory_management_unit + , http://dbpedia.org/resource/Harvard_architecture + , http://dbpedia.org/resource/Programming_language + , http://dbpedia.org/resource/Machine_code + , http://dbpedia.org/resource/Trusted_system + , http://dbpedia.org/resource/Software_verification + , http://dbpedia.org/resource/Black_box + , http://dbpedia.org/resource/Trust_anchor + , http://dbpedia.org/resource/Software_bug + , http://dbpedia.org/resource/Network_server + , http://dbpedia.org/resource/Exploit_%28computer_security%29 + , http://dbpedia.org/resource/Common_Criteria + , http://dbpedia.org/resource/Process_%28computing%29 + , http://dbpedia.org/resource/Trusted_Computer_System_Evaluation_Criteria + , http://dbpedia.org/resource/Software + , http://dbpedia.org/resource/Buffer_overflow + , http://dbpedia.org/resource/David_J._Farber + , http://dbpedia.org/resource/Hardware_security + , http://dbpedia.org/resource/Daemon_%28computer_software%29 + , http://dbpedia.org/resource/Butler_Lampson + , http://dbpedia.org/resource/Privilege_%28computer_science%29 + , http://dbpedia.org/resource/Read-only_memory + , http://dbpedia.org/resource/Setuid + , http://dbpedia.org/resource/CPU + , http://dbpedia.org/resource/Memory_management + , http://dbpedia.org/resource/Software_audit_review + , http://dbpedia.org/resource/Computer_system + , http://dbpedia.org/resource/UNIX + , http://dbpedia.org/resource/Email + , http://dbpedia.org/resource/Computer_hardware + , http://dbpedia.org/resource/Vulnerability_%28computing%29 + , http://dbpedia.org/resource/Monolithic_kernel + , http://dbpedia.org/resource/Security_policy + , http://dbpedia.org/resource/AIX_operating_system + , http://dbpedia.org/resource/Expected_value + , http://dbpedia.org/resource/Password + , http://dbpedia.org/resource/Firmware +
http://dbpedia.org/property/wikiPageUsesTemplate http://dbpedia.org/resource/Template:Textbook + , http://dbpedia.org/resource/Template:As_of + , http://dbpedia.org/resource/Template:Reflist + , http://dbpedia.org/resource/Template:Distinguish + , http://dbpedia.org/resource/Template:Citation_needed_lead + , http://dbpedia.org/resource/Template:Short_description +
http://purl.org/dc/terms/subject http://dbpedia.org/resource/Category:Computer_security_procedures +
http://purl.org/linguistics/gold/hypernym http://dbpedia.org/resource/Set +
http://www.w3.org/ns/prov#wasDerivedFrom http://en.wikipedia.org/wiki/Trusted_computing_base?oldid=1116356882&ns=0 +
http://xmlns.com/foaf/0.1/isPrimaryTopicOf http://en.wikipedia.org/wiki/Trusted_computing_base +
owl:differentFrom http://dbpedia.org/resource/Trusted_Computing +
owl:sameAs http://dbpedia.org/resource/Trusted_computing_base + , http://rdf.freebase.com/ns/m.0bhkq + , http://yago-knowledge.org/resource/Trusted_computing_base + , http://zh.dbpedia.org/resource/%E5%8F%AF%E4%BF%A1%E8%AE%A1%E7%AE%97%E5%9F%BA + , http://www.wikidata.org/entity/Q5492632 + , http://es.dbpedia.org/resource/Base_de_computador_confiable + , http://fi.dbpedia.org/resource/Luotettava_tietojenk%C3%A4sittely + , https://global.dbpedia.org/id/4jpi2 + , http://az.dbpedia.org/resource/Etibarl%C4%B1_Hesablama_Bazas%C4%B1 +
rdf:type http://dbpedia.org/class/yago/WikicatComputerSecurityProcedures + , http://dbpedia.org/class/yago/Procedure101023820 + , http://dbpedia.org/class/yago/Activity100407535 + , http://dbpedia.org/class/yago/PsychologicalFeature100023100 + , http://dbpedia.org/class/yago/YagoPermanentlyLocatedEntity + , http://dbpedia.org/class/yago/Abstraction100002137 + , http://dbpedia.org/class/yago/Event100029378 + , http://dbpedia.org/class/yago/Act100030358 +
rdfs:comment The trusted computing base (TCB) of a compThe trusted computing base (TCB) of a computer system is the set of all hardware, firmware, and/or software components that are critical to its security, in the sense that bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system. By contrast, parts of a computer system that lie outside the TCB must not be able to misbehave in a way that would leak any more privileges than are granted to them in accordance to the system's security policy.ccordance to the system's security policy. , Una Base de computador confiable, también Una Base de computador confiable, también conocido por las siglas TCB (del inglés Trusted Computer Base), es un conjunto de elementos hardware, firmware y software que permiten a un sistema informático implementar los requisitos de seguridad establecidos. Cualquier cosa fuera del TCB puede ser malicioso.​​ Siempre se quiere que la TCB sea lo más pequeña posible de forma que nos podamos centrar en asegurar la seguridad de esa pequeña parte y que la seguridad del resto del sistema se apoye en ella.ad del resto del sistema se apoye en ella. , 可信计算基(英語:Trusted computing base, TCB)是指为实现可信计算基(英語:Trusted computing base, TCB)是指为实现计算机系统安全保护的所有安全保护机制的集合,机制可以硬件、固件和软件的形式出现。一旦可信计算机基的某个构件出现程序错误或者安全隐患,就对整个系统的安全造成危害。 与之相反,如果除可信计算基之外的系统的其他部分出现问题,也只是泄漏了系统安全策略赋予它们的相关权限而已,这些权限一般都是比较低的。 精心设计和实现的系统可信计算基对系统整体安全至关重要。现代操作系统努力降低TCB的大小,使得通过手工或电脑辅助软件审计()或形式化验证的方法对其代码库彻底的检查成为可能。,使得通过手工或电脑辅助软件审计()或形式化验证的方法对其代码库彻底的检查成为可能。
rdfs:label Base de computador confiable , Trusted computing base , 可信计算基
hide properties that link here 
http://dbpedia.org/resource/TCB + http://dbpedia.org/ontology/wikiPageDisambiguates
http://dbpedia.org/resource/Trusted_Computing_Base + , http://dbpedia.org/resource/Trusted_base + http://dbpedia.org/ontology/wikiPageRedirects
http://dbpedia.org/resource/Microsoft_Security_Development_Lifecycle + , http://dbpedia.org/resource/Logic_for_Computable_Functions + , http://dbpedia.org/resource/Security_kernel + , http://dbpedia.org/resource/Embedded_hypervisor + , http://dbpedia.org/resource/Principle_of_least_privilege + , http://dbpedia.org/resource/Trusted_Computing_Base + , http://dbpedia.org/resource/Server-based_signatures + , http://dbpedia.org/resource/Verve_%28operating_system%29 + , http://dbpedia.org/resource/Computer_engineering_compendium + , http://dbpedia.org/resource/Trusted_third_party + , http://dbpedia.org/resource/Genode + , http://dbpedia.org/resource/Minix_3 + , http://dbpedia.org/resource/Embedded_system + , http://dbpedia.org/resource/L4_microkernel_family + , http://dbpedia.org/resource/Microkernel + , http://dbpedia.org/resource/Kernel_%28operating_system%29 + , http://dbpedia.org/resource/TCB + , http://dbpedia.org/resource/JX_%28operating_system%29 + , http://dbpedia.org/resource/Cliff_Wang + , http://dbpedia.org/resource/Trusted_system + , http://dbpedia.org/resource/Trusted_base + , http://dbpedia.org/resource/Trusted_computer_system + http://dbpedia.org/ontology/wikiPageWikiLink
http://en.wikipedia.org/wiki/Trusted_computing_base + http://xmlns.com/foaf/0.1/primaryTopic
http://dbpedia.org/resource/Trusted_Computing + owl:differentFrom
http://dbpedia.org/resource/Trusted_computing_base + owl:sameAs
 

 

Enter the name of the page to start semantic browsing from.