Skip to search formSkip to main contentSkip to account menu

Trusted system

Known as: Trusted systems, Security envelopes, Security envelope 
In the security engineering subspecialty of computer science, a trusted system is a system that is relied upon to a specified extent to enforce a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
We present a new approach aimed at constraining the typical size and optical properties of carbon dust grains in Circumstellar… 
Highly Cited
2009
Highly Cited
2009
Today's technical and legal landscape presents formidable challenges to personal data privacy. First, our increasing reliance on… 
Highly Cited
2008
Highly Cited
2008
Commercial electronic voting systems have experienced many high-profile software, hardware, and usability failures in real… 
Review
2008
Review
2008
This paper investigates trust in the scientists, government authorities and wider risk management team during the ongoing… 
2004
2004
  • W. D. Young
  • Journal of Automated Reasoning
  • 2004
  • Corpus ID: 27052644
We describe the specification, implementation and proof of correctness of a code generator for a subset of Gypsy 2.05. The code… 
Highly Cited
2003
Highly Cited
2003
We report a method for estimating what percentage of people who cited a paper had actually read it. The method is based on a… 
Highly Cited
2001
Highly Cited
2001
Using a detailed radiative transfer analysis, combined with an energy balance equation for the gas, we have performed extensive… 
Highly Cited
2000
Highly Cited
2000
Highly Cited
1993
Highly Cited
1993
Where you can find the guide to understanding covert channel analysis of trusted systems easily? Is it in the book store? On-line…