Trusted Computing Base

The trusted computing base (TCB) of a computer system is the set of all hardware, firmware, and/or software components that are critical to its security, in the sense that bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system. By contrast, parts of a computer system outside the TCB must not be able to misbehave in a way that would leak any more privileges than are granted to them in accordance to the security policy.

The careful design and implementation of a system's trusted computing base is paramount to its overall security. Modern operating systems strive to reduce the size of the TCB so that an exhaustive examination of its code base (by means of manual or computer-assisted software audit or program verification) becomes feasible.

Read more about Trusted Computing Base:  Definition and Characterization, Examples

Famous quotes containing the words trusted and/or base:

    I know that I will always be expected to have extra insight into black texts—especially texts by black women. A working-class Jewish woman from Brooklyn could become an expert on Shakespeare or Baudelaire, my students seemed to believe, if she mastered the language, the texts, and the critical literature. But they would not grant that a middle-class white man could ever be a trusted authority on Toni Morrison.
    Claire Oberon Garcia, African American scholar and educator. Chronicle of Higher Education, p. B2 (July 27, 1994)

    They must to keep their certainty accuse
    All that are different of a base intent;
    Pull down established honour; hawk for news
    Whatever their loose phantasy invent
    And murmur it with bated breath....
    William Butler Yeats (1865–1939)