A secure operating system, and hence a secure … [p. 134] [which] enforces a policy that is controlled … the policy must enforce who (person or process) … be placed on that data. … The second key component is a trusted path. … trusted software, which can be initiated by either … For example, wouldn't it be nice if when … screen, and not a Trojan horse trying to …
Google-1
Google-2
Copyright clearance needed for quotation.