Skip to search formSkip to main contentSkip to account menu

Trust boundary

Trust boundary is a term in computer science and security used to describe a boundary where program data or execution changes its level of "trust… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Aiming at the threats faced by embedded systems, using trusted computing technology to solve embedded security equipment problems… 
2016
2016
With the coming of information era, cloud computing has become a strong pillar for important management, storage, etc. in modern… 
2010
2010
We propose an approach to secure on-demand mobile ad hoc network (MANET) routing protocols by leveraging low-complexity… 
2010
2010
Securing any MANET routing protocol requires measures to ensure that routing information advertised by a node (to its neighbors… 
Review
2008
Review
2008
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to… 
2003
2003
  • S. ShewE. Ye
  • 2003
  • Corpus ID: 62253993
A single user of a connection-oriented network may connect at two points to the network for increased reliability. In this… 
2002
2002
Handling exceptions, errors, and alternative flows are a critical part of defining good use cases and designing good software… 
2000
2000
  • 2000
  • Corpus ID: 166817940
The current Internet assumes the b st-effortservice model. In this model, the network allocates bandwidth among all the…