Knowledge (XXG)

Security kernel

Source 📝

25: 128: 132: 155: 104:
to prevent unauthorized access to, or use of, the system and (b) contains criteria that must be met before specified programs can be accessed.
143: 137: 170: 100:
A self-contained usually small collection of key security-related statements that (a) works as a part of an
75: 108: 34: 79: 39: 59: 112: 82: 101: 94: 164: 147: 90: 86: 71: 93:
that implements the basic security procedures for controlling
18: 32:It has been suggested that this article should be 107:Hardware, firmware, and software elements of a 156:National Information Systems Security Glossary 8: 7: 78:, the central part of a computer or 14: 131: This article incorporates 126: 23: 144:General Services Administration 1: 66:has the following meanings: 187: 38:into multiple articles. ( 76:communications security 139:Federal Standard 1037C 133:public domain material 109:trusted computing base 16:Telecommunication term 171:Computing terminology 80:communications system 97:to system resources. 111:that implement the 60:telecommunications 113:reference monitor 56: 55: 178: 152: 151: 146:. Archived from 130: 129: 102:operating system 51: 48: 27: 26: 19: 186: 185: 181: 180: 179: 177: 176: 175: 161: 160: 136: 127: 125: 122: 64:security kernel 52: 46: 43: 28: 24: 17: 12: 11: 5: 184: 182: 174: 173: 163: 162: 159: 158: 153: 150:on 2022-01-22. 121: 118: 117: 116: 105: 98: 54: 53: 31: 29: 22: 15: 13: 10: 9: 6: 4: 3: 2: 183: 172: 169: 168: 166: 157: 154: 149: 145: 141: 140: 134: 124: 123: 119: 114: 110: 106: 103: 99: 96: 92: 88: 84: 81: 77: 73: 69: 68: 67: 65: 61: 50: 47:February 2023 41: 37: 36: 30: 21: 20: 148:the original 138: 63: 57: 44: 33: 62:, the term 120:References 165:Category 115:concept. 91:software 87:firmware 83:hardware 72:computer 40:discuss 95:access 89:, and 135:from 35:split 74:and 70:In 58:In 42:) 167:: 142:. 85:, 49:) 45:(

Index

split
discuss
telecommunications
computer
communications security
communications system
hardware
firmware
software
access
operating system
trusted computing base
reference monitor
public domain material
Federal Standard 1037C
General Services Administration
the original
National Information Systems Security Glossary
Category
Computing terminology

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.