Trust boundary

Trust boundary is a term in computer science and security used to describe a boundary where program data or execution changes its level of "trust… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1999-2016
02419992016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Among the various facets of cybersecurity, software security plays a crucial role. This requires the assessment of the security… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Review
2015
Review
2015
We present a brief overview of the main challenges related to data protection that need to be addressed when data are stored… (More)
Is this relevant?
2014
2014
We present a fuzzing framework for Intents: the core IPC mechanism for intra- and inter-app communication in Android. Since… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
Is this relevant?
Highly Cited
2014
Highly Cited
2014
NetVM brings virtualization to the Network by enabling high bandwidth network functions to operate at near line speed, while… (More)
Is this relevant?
2011
2011
We provide a design and implementation of self-protecting electronic medical records (EMRs) using attribute-based encryption on… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2010
2010
A Network Address Translator allows hosts in a private address space to communicate with servers in the public Internet. There is… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We provide a design and implementation of self-protecting electronic medical records (EMRs) using attribute-based encryption. Our… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
With the utilization of TPM-based trusted platforms in real applications, and the subsequent adaption of the specification to the… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2009
2009
We present a novel combination of hardware (architecture) and software (compiler) techniques to support the safe execution of… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Smart card systems di er from conventional computer systems in that di erent aspects of the system are not under a single trust… (More)
Is this relevant?