Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,629,575 papers from all fields of science
Search
Sign In
Create Free Account
Trust boundary
Trust boundary is a term in computer science and security used to describe a boundary where program data or execution changes its level of "trust…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
5 relations
Computer science
Privilege (computing)
Superuser
Vulnerability (computing)
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
A LINDDUN-Based framework for privacy threat analysis on identification and authentication processes
Antonio Robles-González
,
Javier Parra-Arnau
,
J. Forné
Comput. Secur.
2020
Corpus ID: 214007341
2018
2018
A Framework for Web Application Integrity
Pedro Fortuna
,
N. Pereira
,
I. Butun
ICISSP
2018
Corpus ID: 4735578
Due to their universal accessibility, interactivity and scaling ease, Web applications relying on client-side code execution are…
Expand
2017
2017
TARN: A SDN-based traffic analysis resistant network architecture
Lu Yu
,
Qing Wang
,
C. Barrineau
,
Jon Oakley
,
R. Brooks
,
Kuangching Wang
12th International Conference on Malicious and…
2017
Corpus ID: 4328171
Destination IP prefix-based routing protocols are core to Internet routing today. Internet autonomous systems (AS) possess fixed…
Expand
2010
2010
Provably correct inline monitoring for multithreaded Java-like programs
M. Dam
,
B. Jacobs
,
Andreas Lundblad
,
F. Piessens
J. Comput. Secur.
2010
Corpus ID: 14704970
Inline reference monitoring is a powerful technique to enforce security policies on untrusted programs. The security-by-contract…
Expand
2009
2009
Security Monitor Inlining for Multithreaded Java
M. Dam
,
B. Jacobs
,
Andreas Lundblad
,
F. Piessens
ECOOP
2009
Corpus ID: 17536546
Program monitoring is a well-established and efficient approach to security policy enforcement. An implementation of program…
Expand
Review
2008
Review
2008
Modeling the Trust Boundaries Created by Securable Objects
Matt Miller
WOOT
2008
Corpus ID: 12302221
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to…
Expand
2008
2008
An Attack Scenario Based Approach for Software Security Testing at Design Stage
Ke He
,
Zhiyong Feng
,
Xiaohong Li
International Symposium on Computer Science and…
2008
Corpus ID: 442642
This paper presents an attack scenario based approach for software security testing at design stage. Attack scenarios are…
Expand
2003
2003
Vulnerabilities in synchronous IPC designs
J. Shapiro
Symposium on Security and Privacy, .
2003
Corpus ID: 638543
Recent advances in interprocess communication (IPC) performance have been exclusively based on thread-migrating IPC designs…
Expand
2000
2000
Differentiated services: architecture, mechanisms and evaluation
L. Peterson
,
D. Clark
,
W. Fang
2000
Corpus ID: 166817940
The current Internet assumes the b st-effortservice model. In this model, the network allocates bandwidth among all the…
Expand
1980
1980
Public Trust Protection for Stream Flows and Lake Levels
R. W. Johnson
1980
Corpus ID: 169927052
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE