Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,273 papers from all fields of science
Search
Sign In
Create Free Account
Trust boundary
Trust boundary is a term in computer science and security used to describe a boundary where program data or execution changes its level of "trust…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Computer science
Privilege (computing)
Superuser
Vulnerability (computing)
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Research on Key Technologies of Trusted Enhancement in Embedded Systems
Xin-lai Dang
,
Fei Wang
,
Jie Qiang
2018
Corpus ID: 69677082
Aiming at the threats faced by embedded systems, using trusted computing technology to solve embedded security equipment problems…
Expand
2016
2016
XENPWN : BREAKING PARAVIRTUALIZED DEVICES BLACK HAT USA 2016
Double Fetches
,
Intel Ept
,
Nested Virtualization
2016
Corpus ID: 4161001
2016
2016
Information Security Technology under Cloud Computing Technology
X. Zhao
2016
Corpus ID: 63149649
With the coming of information era, cloud computing has become a strong pillar for important management, storage, etc. in modern…
Expand
2011
2011
Signal-Layer Security and Trust-Boundary Identification based on Hardware-Software Interface Definition
Georg Macher
,
H. Sporer
,
E. Brenner
,
Christian Kreiner
J. Ubiquitous Syst. Pervasive Networks
2011
Corpus ID: 65085745
An important trend in the automotive domain is to adapt established functional safety processes and methods for security…
Expand
2010
2010
Implementing Trust-to-Trust with Customer Edge Switching
R. Kantola
IEEE 24th International Conference on Advanced…
2010
Corpus ID: 14089913
A Network Address Translator allows hosts in a private address space to communicate with servers in the public Internet. There is…
Expand
2010
2010
Leveraging a Minimal Trusted Computing Base for Securing On-Demand MANET Routing Protocols
Vinay Thotakura
,
M. Ramkumar
2010
Corpus ID: 17091198
We propose an approach to secure on-demand mobile ad hoc network (MANET) routing protocols by leveraging low-complexity…
Expand
Review
2008
Review
2008
Modeling the Trust Boundaries Created by Securable Objects
Matt Miller
Workshop on Offensive Technologies
2008
Corpus ID: 12302221
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to…
Expand
2002
2002
What it Really Takes to Handle Exceptional Conditions
R. Wirfs-Brock
,
M. Mirshahi
2002
Corpus ID: 60937766
Handling exceptions, errors, and alternative flows are a critical part of defining good use cases and designing good software…
Expand
2000
2000
Differentiated services: architecture, mechanisms and evaluation
2000
Corpus ID: 166817940
The current Internet assumes the b st-effortservice model. In this model, the network allocates bandwidth among all the…
Expand
1980
1980
Public Trust Protection for Stream Flows and Lake Levels
R. W. Johnson
1980
Corpus ID: 169927052
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE