Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
S
S
S&T
SAO
SAP
SAV
Say
SCG
SCI
SCP
SDR
Set
S-F
SFA
SI
SIG
SMM
SMO
SMU
SO
SOH
SON
SOS
SOW
SPK
Spl
SPO
SPS
Spy
SRI
SRP
SRR
SSE
SSO
SSR
STD
STI
STS
STU
STX
SUB
SYN
Security Kernel
  • The hardware, firmware, and software elements of a Trusted Computing Base that implement the reference monitor concept. It must mediate all accesses, be protected from modification, and be verifiable as correct. (CSC-STD-001-85; NCSC-WA-001-85;)
  • The central part of a computer system (software and hardware) that implements the fundamental security procedures for controlling access to system resources. (FIPS PUB 39;)
  • A localized mechanism, composed of hardware and software, that controls the access of users (and processes executing on their behalf) to repositories of information resident in or connected to the system. The correct operation of the kernel along with any associated trusted processes should be sufficient to guarantee enforcement of the constraints on access. TCBs have been implemented using security kernels along with trusted processes. (MTR-8201;)