Task Control Block

Known as: TCB 
The Task Control Block (TCB) is an instance of a Process control block in an IBM System/360 architecture and successors operating system environment… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1983-2017
0204019832017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Smart contracts are programs that execute autonomously on blockchains. Their key envisioned uses (e.g. financial instruments… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 7
Is this relevant?
2014
2014
Mobile devices are frequently used as terminals to interact with many security-critical services such as mobile payment and… (More)
  • figure 1
  • table 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
2012
2012
The standard approach for privilege separation in web applications is to execute application components in different web origins… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2012
2012
One of the biggest problems of SMEs is their tendencies to financial distress because of insufficient finance background. In this… (More)
Is this relevant?
2010
2010
Virtualization is a rapidly evolving technology that can be used to provide a range of benefits to computing systems, including… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs… (More)
  • figure 2
  • table 1
Is this relevant?
Highly Cited
2006
Highly Cited
2006
The large size and high complexity of security-sensitive applications and systems software is a primary cause for their poor… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
The trusted computing bases (TCBs) of applications running on today's commodity operating systems have become extremely large… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In this paper, we present an approach for analyzing the integrity protection in the SELinux example policy. The SELinux example… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2000
2000
In a recent paper we introduced a new model to deal with the problem of handling application timeliness requirements in… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 3
  • figure 4
Is this relevant?