Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,184,864 papers from all fields of science
Search
Sign In
Create Free Account
Trusted computing base
Known as:
TCB
, Trusted base
, Trusted computer system
The trusted computing base (TCB) of a computer system is the set of all hardware, firmware, and/or software components that are critical to its…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
39 relations
Access control
Buffer overflow
Common Criteria
Computer hardware
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2007
Highly Cited
2007
Minimal TCB Code Execution
Jonathan M. McCune
,
Bryan Parno
,
A. Perrig
,
M. Reiter
,
Arvind Seshadri
IEEE Symposium on Security and Privacy
2007
Corpus ID: 5638506
We propose an architecture that allows code to execute in complete isolation from other software while trusting only a tiny…
Expand
2007
2007
A temperature‐related homogenization technique and its implementation in the meshfree particle method for nanoscale simulations
S. Xiao
,
Weixuan Yang
2007
Corpus ID: 15601275
A new homogenization technique, the temperature‐related Cauchy–Born (TCB) rule, is proposed in this paper with the consideration…
Expand
2005
2005
Deductive Runtime Certification
Konstantine Arkoudas
,
M. Rinard
RV@ETAPS
2005
Corpus ID: 5256306
2004
2004
Characterization of hepatic and extrahepatic glutathione S-transferases in rainbow trout (Oncorhynchus mykiss) and their induction by 3,3′,4,4′-tetrachlorobiphenyl
M. Pérez-López
,
P. Anglade
,
+4 authors
P. Rouimi
Fish Physiology & Biochemistry
2004
Corpus ID: 9199690
Liver, kidney, gill and olfactory epithelium cytosolic fractions of rainbow trout (Oncorhynchus mykiss) were examined for…
Expand
Highly Cited
2003
Highly Cited
2003
Smart Card operating systems: Past Present and Future
D. Deville
,
A. Galland
,
G. Grimaud
,
Sébastien Jean
2003
Corpus ID: 1023331
Over the last twenty years, the software in smart cards has radically changed. This has happened for several reasons, smart card…
Expand
2003
2003
Hack-a-Vote: Demonstrating Security Issues with Electronic Voting Systems
Jonathan Bannet
,
David W. Price
,
A. Rudys
,
Justin Singer
,
D. Wallach
2003
Corpus ID: 394924
A representative democracy depends on a universally trusted voting system for the election of representatives; voters need to…
Expand
2003
2003
Context-Aware Middleware for Pervasive and Ad Hoc Environments
H. Duran-Limon
,
G. Blair
,
+4 authors
Wu Maomao
2003
Corpus ID: 14931139
Recent advances in the area of mobile computing and pervasive computing have driven the emergence of new challenges. For example…
Expand
2001
2001
A Minimal Trusted Computing Base for Dynamically Ensuring Secure Information Flow
J. Brown
,
Tom Knight
2001
Corpus ID: 2159343
With each passing year, more and more valuable, confidential information is stored in government and commercial computer systems…
Expand
1998
1998
TIME SCALES IN THE JPL AND CFA EPHEMERIDES
E. Standish
1998
Corpus ID: 18977215
Over the past decades, the IAU has repeatedly attempted to correct its definition of the basic fundamental argument used in the…
Expand
1990
1990
Building Trust Into A Multilevel File System
C. Irvine
1990
Corpus ID: 14230809
File systems are an intrinsic part of any operating system providing support for a general application environment. To help…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE