Homework #2 Extra Credit
Due: May 1, 2017
- (15 points) What are the conceptual differences between a reference validation mechanism, a trusted computing base, and the TOE Security Functions?
- (20 points) Consider Theorem 5.6. Would the theorem hold if the requirement that $z_0$ be a secure state were eliminated? Justify your answer.