The trusted computing base comprises the reference validation mechanism while the TOE contributes to the protection of the trusted computing base.

The reference validation mechanism came about as an implementation of the reference monitor concept. The reference validation mechanism has three principles, i.e., it must be tamper-proof, it must be small in size to allow for analysis and tests to assure its correctness, and it must always be invoked.

The mechanism being tamper-proof refers to its ability to maintain a domain that protects it from being tampered with. Its small size is specified by specific architecture requirements, and the principle of it being invoked refers to the ability to isolate resources to be protected, exposing them to auditing requirements and access control.

Answer by Academic.tip's expert
An answer to this question is provided by one of our experts who specializes in technology & it. Let us know how much you liked it and give it a rating.

Cite this page

Select a citation style:

References

Academic.Tips. (2022) 'The trusted computing base comprises the reference validation mechanism while the TOE contributes to the protection of the trusted computing base'. 30 July.

Reference

Academic.Tips. (2022, July 30). The trusted computing base comprises the reference validation mechanism while the TOE contributes to the protection of the trusted computing base. https://academic.tips/question/the-trusted-computing-base-comprises-the-reference-validation-mechanism-while-the-toe-contributes-to-the-protection-of-the-trusted-computing-base/

References

Academic.Tips. 2022. "The trusted computing base comprises the reference validation mechanism while the TOE contributes to the protection of the trusted computing base." July 30, 2022. https://academic.tips/question/the-trusted-computing-base-comprises-the-reference-validation-mechanism-while-the-toe-contributes-to-the-protection-of-the-trusted-computing-base/.

1. Academic.Tips. "The trusted computing base comprises the reference validation mechanism while the TOE contributes to the protection of the trusted computing base." July 30, 2022. https://academic.tips/question/the-trusted-computing-base-comprises-the-reference-validation-mechanism-while-the-toe-contributes-to-the-protection-of-the-trusted-computing-base/.


Bibliography


Academic.Tips. "The trusted computing base comprises the reference validation mechanism while the TOE contributes to the protection of the trusted computing base." July 30, 2022. https://academic.tips/question/the-trusted-computing-base-comprises-the-reference-validation-mechanism-while-the-toe-contributes-to-the-protection-of-the-trusted-computing-base/.

Work Cited

"The trusted computing base comprises the reference validation mechanism while the TOE contributes to the protection of the trusted computing base." Academic.Tips, 30 July 2022, academic.tips/question/the-trusted-computing-base-comprises-the-reference-validation-mechanism-while-the-toe-contributes-to-the-protection-of-the-trusted-computing-base/.

Copy