Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,851,512 papers from all fields of science
Search
Sign In
Create Free Account
Trusted system
Known as:
Trusted systems
, Security envelopes
, Security envelope
Expand
In the security engineering subspecialty of computer science, a trusted system is a system that is relied upon to a specified extent to enforce a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
27 relations
Access control list
Categorization
Common Criteria
Computer science
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
An Experimental Study Analysis of Security Attacks at IEEE 802.11 Wireless Local Area Network
Md. Waliullah
,
A B M Moniruzzaman
,
Md. Sadekur Rahman
2015
Corpus ID: 16231659
IEEE802.11 wireless networks have become one of the most widely used networks. Due to open nature of wireless medium, hackers and…
Expand
2013
2013
ENHANCING SECURITY IN CRYPTOGRAPHIC SMART CARDS THROUGH ELLIPTIC CURVE CRYPTOGRAPHY AND OPTIMIZED MODIFIED MATRIX ENCODING
G. Prakash
,
Dr. M. Kannan
2013
Corpus ID: 16758686
Now-a-days Cryptographic smart cards are being used for most of the online transactions in many fields . But the security and the…
Expand
2012
2012
Employee referral, social proximity and worker discipline
A. Dhillon
,
V. Iversen
,
Gaute Torsvik
2012
Corpus ID: 53955930
We study ex-post hiring risks in low income countries with limited legal and regulatory frameworks. In our theory of employee…
Expand
2011
2011
Spatially extended emission around the Cepheid RS Puppis in near-infrared hydrogen lines - Adaptive optics imaging with VLT/NACO
A. Gallenne
,
A. M'erand
,
P. Kervella
,
Julien H. Girard
2011
Corpus ID: 118501763
Context. It has been recently discovered that Cepheids harbor circumstellar envelopes (CSEs). RS Pup is the Cepheid that presents…
Expand
2010
2010
A Cloud Architecture of Virtual Trusted Platform Modules
Dongxi Liu
,
Jack Lee
,
Julian Jang
,
S. Nepal
,
J. Zic
IEEE/IFIP International Conference on Embedded…
2010
Corpus ID: 6805245
We propose and implement a cloud architecture of virtual TPMs. In this architecture, TPM instances can be obtained from the TPM…
Expand
Review
2006
Review
2006
Expressive Bayesian Voters , their Turnout Decisions , and Double Probit : Empirical Implications of a Theoretical Model
Christopher H. Achen
2006
Corpus ID: 13992630
Voting is an expressive act. Since people are not born wanting to express themselves politically, the desire to vote must be…
Expand
2005
2005
Mobile military security with concentration on unmanned aerial vehicles
Jr. W.R. Dufrene
Digital Avionics Systems Conference
2005
Corpus ID: 16899075
This research investigates the increasingly complex issues confronted when implementing security in the mobile computing and…
Expand
Review
2003
Review
2003
Rights Expression Languages
Karen Coyle
ACM Digital Rights Management Workshop
2003
Corpus ID: 3026329
This chapter provides an overview of the field of rights expression languages RELs). It justifies the need for rights expression…
Expand
2001
2001
Taking the Copy Out of Copyright
Ernest Miller
,
J. Feigenbaum
Digital Rights Management Workshop
2001
Corpus ID: 31928533
Under current U.S. law and common understanding, the fundamental right granted by copyright is the right of reproduction -- of…
Expand
1999
1999
Trusted system construction
C. O'Halloran
Proceedings of the 12th IEEE Computer Security…
1999
Corpus ID: 1119980
Any system constructed today is likely to be constructed from COTS components. Encapsulation of these components using software…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required