L-4 P.47
Elements of a Trusted Computing Base
Hardware
• Includes processors, memory, registers, clock, and I/O devices
Some notion of Processes
• Allows separation and protection of security-critical processes
Primitive files
• Examples: security access control database and identification and authentication data
Protected memory
• Ensures that reference monitor can be protected from tampering
Interprocess communication
• Allows different parts of the TCB to pass data to and activate other parts