Skip to search formSkip to main contentSkip to account menu

Trust boundary

Trust boundary is a term in computer science and security used to describe a boundary where program data or execution changes its level of "trust… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Due to their universal accessibility, interactivity and scaling ease, Web applications relying on client-side code execution are… 
2017
2017
Destination IP prefix-based routing protocols are core to Internet routing today. Internet autonomous systems (AS) possess fixed… 
2010
2010
Inline reference monitoring is a powerful technique to enforce security policies on untrusted programs. The security-by-contract… 
2009
2009
Program monitoring is a well-established and efficient approach to security policy enforcement. An implementation of program… 
Review
2008
Review
2008
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to… 
2008
2008
This paper presents an attack scenario based approach for software security testing at design stage. Attack scenarios are… 
2003
2003
  • J. Shapiro
  • Symposium on Security and Privacy, .
  • 2003
  • Corpus ID: 638543
Recent advances in interprocess communication (IPC) performance have been exclusively based on thread-migrating IPC designs… 
2000
2000
The current Internet assumes the b st-effortservice model. In this model, the network allocates bandwidth among all the…