Modeling the Trust Boundaries Created by Securable Objects

@inproceedings{Miller2008ModelingTT,
  title={Modeling the Trust Boundaries Created by Securable Objects},
  author={Matt Miller},
  booktitle={WOOT},
  year={2008}
}
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can be used to help obtain this understanding from an application’s design, it can be difficult to accurately map this understanding to an application’s implementation. This difficulty suggests that there is a need for techniques that can be used to gain a better understanding of the trust boundaries that exist within an… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

Explore Further: Topics Discussed in This Paper

Similar Papers

Loading similar papers…