Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Trust boundary

Trust boundary is a term in computer science and security used to describe a boundary where program data or execution changes its level of "trust… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
An important trend in the automotive domain is to adapt established functional safety processes and methods for security… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
2017
2017
Abstract: An important trend in the automotive domain is to adapt established functional safety processes and methods for… Expand
Is this relevant?
Highly Cited
2015
Highly Cited
2015
NetVM brings virtualization to the Network by enabling high bandwidth network functions to operate at near line speed, while… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
We provide a design and implementation of self-protecting electronic medical records (EMRs) using attribute-based encryption on… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2010
2010
  • Raimo Kantola
  • IEEE 24th International Conference on Advanced…
  • 2010
  • Corpus ID: 14089913
A Network Address Translator allows hosts in a private address space to communicate with servers in the public Internet. There is… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
2010
2010
Inline reference monitoring is a powerful technique to enforce security policies on untrusted programs. The security-by-contract… Expand
  • figure 1
  • figure 2
  • figure 4
  • table 1
Is this relevant?
2009
2009
With the utilization of TPM-based trusted platforms in real applications, and the subsequent adaption of the specification to the… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Review
2008
Review
2008
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2008
2008
This paper presents an attack scenario based approach for software security testing at design stage. Attack scenarios are… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Smart card systems differ from conventional computer systems in that different aspects of the system are not under a single trust… Expand
Is this relevant?