Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Trusted system

Known as: Trusted systems, Security envelopes, Security envelope 
In the security engineering subspecialty of computer science, a trusted system is a system that is relied upon to a specified extent to enforce a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
We present a new approach aimed at constraining the typical size and optical properties of carbon dust grains in Circumstellar… Expand
  • table 1
  • figure 1
  • figure 3
  • figure 2
  • figure 4
Is this relevant?
Highly Cited
2012
Highly Cited
2012
In recent years, formal certification programs for rating and evaluating the sustainability and energy efficiency of buildings… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Today's technical and legal landscape presents formidable challenges to personal data privacy. First, our increasing reliance on… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Commercial electronic voting systems have experienced many high-profile software, hardware, and usability failures in real… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2006
2006
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to… Expand
  • figure 1
  • figure 2
  • table 2
  • table 4
  • figure 3
Is this relevant?
2004
2004
This paper focuses on the problem of dealing with privacy obligations in enterprises. Privacy obligations dictate expected… Expand
  • table 1
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
  • W. Young
  • Journal of Automated Reasoning
  • 2004
  • Corpus ID: 27052644
We describe the specification, implementation and proof of correctness of a code generator for a subset of Gypsy 2.05. The code… Expand
  • figure 2
  • figure 3
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Using a detailed radiative transfer analysis, combined with an energy balance equation for the gas, we have performed extensive… Expand
  • table 1
  • figure 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1998
Highly Cited
1998
This paper proposes a model for quantifying and reasoning about trust in IT equipment. Trust is considered to be a subjective… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1994
Highly Cited
1994
Abstract Information Security Management consists of various facets, such as Information Security Policy, Risk Analysis, Risk… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?