Trusted computing base
Mandatory access control
Trusted Computing
Microkernel
Ring
Kernel
Operating system
Trustworthy computing
Security kernel
Computer security
Security
Computing