Trusted computing base

Known as: TCB, Trusted base, Trusted computer system 
The trusted computing base (TCB) of a computer system is the set of all hardware, firmware, and/or software components that are critical to its… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Devices participating in mobile ad hoc networks (MANET) are expected to strictly adhere to a uniform routing protocol to route… (More)
  • figure 1
  • figure 3
Is this relevant?
Highly Cited
2013
Highly Cited
2013
In this paper we propose Sancus, a security architecture for networked embedded devices. Sancus supports extensibility in the… (More)
  • figure 1
  • figure 3
  • table 1
  • figure 4
  • figure 5
Is this relevant?
2010
2010
In this paper we explore how recent advances in virtualisation support for commodity hardware could be utilised to reduce the… (More)
  • figure 1
Is this relevant?
2009
2009
Today we have powerful, feature-rich computer systems plagued by powerful, feature-rich malware. Current malware exploit the… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In this paper we describe bugs and ways to attack trusted computing systems based on a static root of trust such as Microsoft’s… (More)
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Current systems are very often based on largescale, unpredictable and unreliable infrastructures. However, users of these systems… (More)
  • figure 1
  • figure 2
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
  • Trevor Jim
  • IEEE Symposium on Security and Privacy
  • 2001
We introduce SD3, a trust management system consisting of a high-level policy language, a local policy evaluator, and a… (More)
  • figure 1
  • figure 4
Is this relevant?
2001
2001
With each passing year, more and more valuable, confidential information is stored in government and commercial computer systems… (More)
  • figure 1
  • figure 2
Is this relevant?
1997
1997
This debate was conceived by Carl Landwehr, who asked me to serve as moderator. The proposition under discussion was first put… (More)
Is this relevant?
1984
1984
The structure of many secure systems has been based on the idea of a security kernel—an operating system nucleus that performs… (More)
Is this relevant?