Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Trust boundary

Trust boundary is a term in computer science and security used to describe a boundary where program data or execution changes its level of "trust… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Due to their universal accessibility, interactivity and scaling ease, Web applications relying on client-side code execution are… Expand
  • figure 1
  • figure 2
  • figure 3
2017
2017
Destination IP prefix-based routing protocols are core to Internet routing today. Internet autonomous systems (AS) possess fixed… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
Review
2015
Review
2015
We present a brief overview of the main challenges related to data protection that need to be addressed when data are stored… Expand
2010
2010
Inline reference monitoring is a powerful technique to enforce security policies on untrusted programs. The security-by-contract… Expand
  • figure 1
  • figure 2
  • figure 4
  • table 1
2009
2009
Program monitoring is a well-established and efficient approach to security policy enforcement. An implementation of program… Expand
  • figure 3
  • figure 4
  • table 1
2008
2008
This paper presents an attack scenario based approach for software security testing at design stage. Attack scenarios are… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 6
Review
2008
Review
2008
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to… Expand
  • figure 1
  • figure 2
  • figure 3
2003
2003
  • J. Shapiro
  • Symposium on Security and Privacy, .
  • 2003
  • Corpus ID: 638543
Recent advances in interprocess communication (IPC) performance have been exclusively based on thread-migrating IPC designs… Expand
  • table 1
2000
2000
The current Internet assumes the b st-effortservice model. In this model, the network allocates bandwidth among all the… Expand
  • figure 2.1
  • figure 2.2
  • table 2.1
  • figure 2.3
  • figure 3.1