TERMIUM Plus®

La banque de données terminologiques et linguistiques du gouvernement du Canada.

TRUSTED OBJECT [3 fiches]

Fiche 1 1997-11-27

Anglais

Subject field(s)
  • IT Security
CONT

... you could deny your application the ability to write anywhere in the file system, but allow it to add a limited number of records to a database. Since you assign these privileges directly in the application, they are preserved regardless of where the application originates-whether on the network or on your local drive. By creating a trusted object that implements limited capabilities, and giving an untrusted object the ability to send messages to this new object, you can obtain more functionality from the untrusted code without compromising security. You also do not have to rely on third-party security mechanisms to assign privileges for your application.

Français

Domaine(s)
  • Sécurité des TI

Espagnol

Conserver la fiche 1

Fiche 2 1997-11-27

Anglais

Subject field(s)
  • IT Security
CONT

The TCB [Trusted computing base] shall be able to record the following types of events : use of identification and authentication mechanisms, introduction of objects into a user's address space(e. g., file open, program initiation), deletion of objects, actions taken by computer operators and system administrators and/or events, for each recorded event, the audit record shall identify : date and time of the event, user, type of event, and success or failure of the event. For identification/authentication events the origin of request(e. g., terminal ID) shall be included in the audit record for events that introduce and object into a user's address space and for object deletion events the audit record shall include the name of the object. The ADP [Automated data processing] system administrator shall be able to selectively audit the actions of any one or more users based on individual identity.

Français

Domaine(s)
  • Sécurité des TI

Espagnol

Conserver la fiche 2

Fiche 3 1997-11-27

Anglais

Subject field(s)
  • IT Security
DEF

... a subject that is part of the TCB [trusted computing base]. It has the ability to violate the security policy, but is trusted not to actually do so. For example in the Bell-La Padula model a trusted subject is not constrained by the star([star]:) property and thus has the ability to write sensitive information into an object whose level is not dominated by the(maximum) level of the subject, but it is trusted to only write information into objects with a label appropriate for the actual level of the information(TNI).

OBS

The word "star" replaces the symbol "star", which can not be reproduced because of technical constraints.

Français

Domaine(s)
  • Sécurité des TI

Espagnol

Conserver la fiche 3

Avis de droit d’auteur pour la banque de données TERMIUM Plus®

© Services publics et Approvisionnement Canada, 2025
TERMIUM Plus®, la banque de données terminologiques et linguistiques du gouvernement du Canada
Un produit du Bureau de la traduction

En vedette

Portail linguistique du Canada

Accédez à une collection de ressources canadiennes sur tous les aspects du français et de l'anglais, y compris des jeux.

Outils d'aide à la rédaction

Les outils d’aide à la rédaction du Portail linguistique ont fait peau neuve! Faciles à consulter, ils vous donnent accès à une foule de renseignements utiles pour mieux écrire en français et en anglais.

Lexiques et vocabulaires

Accédez aux lexiques et vocabulaires du Bureau de la traduction.

Date de modification :