This is the second paper of a series of three related papers that exam
ine contemporary information technology concepts. The first paper exam
ined how the security community developed the accepted concepts and cr
iteria, looked at changes currently ongoing, and provided insight into
the driving forces and probable directions. This paper presents conte
mporary thinking about object management and summarizes vertical and h
orizontal extensions to the Trusted Computing Base (TCB) concept.