Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,270,931 papers from all fields of science
Search
Sign In
Create Free Account
Trust boundary
Trust boundary is a term in computer science and security used to describe a boundary where program data or execution changes its level of "trust…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Computer science
Privilege (computing)
Superuser
Vulnerability (computing)
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Research on Key Technologies of Trusted Enhancement in Embedded Systems
Xin-lai Dang
,
Fei Wang
,
Jie Qiang
2018
Corpus ID: 69677082
Aiming at the threats faced by embedded systems, using trusted computing technology to solve embedded security equipment problems…
Expand
2016
2016
XENPWN : BREAKING PARAVIRTUALIZED DEVICES BLACK HAT USA 2016
Double Fetches
,
Intel Ept
,
Nested Virtualization
2016
Corpus ID: 4161001
2016
2016
Information Security Technology under Cloud Computing Technology
X. Zhao
2016
Corpus ID: 63149649
With the coming of information era, cloud computing has become a strong pillar for important management, storage, etc. in modern…
Expand
2010
2010
Leveraging a Minimal Trusted Computing Base for Securing On-Demand MANET Routing Protocols
Vinay Thotakura
,
M. Ramkumar
2010
Corpus ID: 17091198
We propose an approach to secure on-demand mobile ad hoc network (MANET) routing protocols by leveraging low-complexity…
Expand
2010
2010
Minimal trusted computing base for MANET nodes
Vinay Thotakura
,
M. Ramkumar
IEEE International Conference on Wireless and…
2010
Corpus ID: 16995557
Securing any MANET routing protocol requires measures to ensure that routing information advertised by a node (to its neighbors…
Expand
Review
2008
Review
2008
Modeling the Trust Boundaries Created by Securable Objects
Matt Miller
Workshop on Offensive Technologies
2008
Corpus ID: 12302221
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to…
Expand
2003
2003
Dual homing applications in transport networks
S. Shew
,
E. Ye
Fourth International Workshop on Design of…
2003
Corpus ID: 62253993
A single user of a connection-oriented network may connect at two points to the network for increased reliability. In this…
Expand
2002
2002
What it Really Takes to Handle Exceptional Conditions
R. Wirfs-Brock
,
M. Mirshahi
2002
Corpus ID: 60937766
Handling exceptions, errors, and alternative flows are a critical part of defining good use cases and designing good software…
Expand
2000
2000
Differentiated services: architecture, mechanisms and evaluation
2000
Corpus ID: 166817940
The current Internet assumes the b st-effortservice model. In this model, the network allocates bandwidth among all the…
Expand
1980
1980
Public Trust Protection for Stream Flows and Lake Levels
R. W. Johnson
1980
Corpus ID: 169927052
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE