Given a trusted computing system, the security mechanisms or capabilities are collectively called a trusted computing base (TCB); the security kernel is one of the TCB components or modules that is in charge of access control or authentication, authorization, and accounting (3A) specifically. The security kernel is the implementation of the reference monitor concept mentioned in the Anderson report by James P. Anderson & Co. in October of 1972. The security perimeter separates the components unrelated to security enforcement form those of the TCB.