Data Protection and Security |
||||||
VI |
Operating System Security and Secure Programming |
|||||
VI.II |
Operating System Security |
|||||
The reference monitor is an abstract concept, the security kernel is its implementation, and the trusted computing base contains the security kernel among other protection mechanisms. Three rules:
|
||||||
|
||||||
|
chapter index | |||||