Structuring Trust in A Large General Purpose Operating System

  • T. A. Parker


This paper describes the approach taken in ICL to ameliorate the problem of evaluating the security of a large operating system in which the number of Trusted Computing Base and Trusted Process code procedures is large enough to make exhaustive detailed scrutinisation more than exhausting. The approach is applicable to any structured large general purpose system that enables a convent ial TCB/ Trusted Process architecture to be implemented, though it is described in the paper with particular refer once to ICL’s W E operating system.


User Authentication Trust Computing Mandatory Policy Security Responsibility Accidental Leakage 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    VME/B.A Model for the Realisation of a Total System Concept, ICL Technical Journal, Vol. 2 Issue 2, 1980, BC Vferboys.Google Scholar
  2. VME Security Option Product Overview, ICL Internal Document.Google Scholar
  3. 3.
    Trusted Computer System Evalution Criteria, DoD CSC, Fort Meade, Md, August 1983.Google Scholar
  4. 4.
    Security in a Large General Purpose Operating Systems ICL’’s Approach in VME, ICL Technical Journal Vol. 3 Issue 1, 1982.Google Scholar
  5. 5.
    CADES - Software Engineering in Practice, ICL Technical Journal Vol. 2 Issue 1, 1980.Google Scholar
  6. 6.
    Secure Computer Systems Unified Exposition and Multics Interpretation, ESD-TR-75-306, Mitre Corporation report MTR-2997, January 1976, DE Bell and LJ LaPadula.Google Scholar

Copyright information

© T.A. Parker 1990

Authors and Affiliations

  • T. A. Parker
    • 1
  1. 1.ICL Defence SystemsWinnersh, Wokingham, BerksUK

Personalised recommendations