What was introduced for circumventing difficulties in classic approaches to computer security by
limiting damages produced by malicious programs?

A.
Integrity-preserving
B.
Reference Monitor
C.
Integrity-monitoring
D.
Non-Interference
Explanation:
“reference monitor … mediates all access subjects have to objects … protect the objects from
unauthorized access and destructive modification” , Ibid p 273
Reference monitor is part of the TCB concept
Not D: “noninterference … is implemented to ensure that any actions that take place at a higher
security level do not affect … actions that take place at a lower level”, Harris, 3rd Ed, p 290.
It is part of the information flow model.
check
0
0