[The] totality of protection mechanisms within a computer system , including hardware , firmware , and software , the combination of which is responsible for enforcing a security policy. Note: The ability of a trusted computing base to enforce correctly a unified security policy depends on the correctness of the mechanisms within the trusted computing base, the protection of those mechanisms to ensure their correctness, and the correct input of parameters related to the security policy. [ NIS ]
TRUSTED COMPUTING BASE (TCB)
Meaning of TRUSTED COMPUTING BASE (TCB) in English
Telecommunication standard terms English vocab. Английский словарь стандартных телекоммуникационных терминов. 2012