**Due**: May 1, 2017**Points**: 35

- (
*15 points*) What are the conceptual differences between a reference validation mechanism, a trusted computing base, and the TOE Security Functions? - (
*20 points*) Consider Theorem 5.6. Would the theorem hold if the requirement that $z_0$ be a secure state were eliminated? Justify your answer.

You can also obtain a PDF version of this. | Version of April 19, 2017 at 12:51PM |