Trusted system

Known as: Trusted systems, Security envelopes, Security envelope 
In the security engineering subspecialty of computer science, a trusted system is a system that is relied upon to a specified extent to enforce a… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
FPGA devices provide a range of security features which can provide powerful security capabilities. This paper describes many… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2012
2012
MapReduce systems deployed over an open infrastructure such as a cloud have attracted much attention, due to the significant… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table II
Is this relevant?
2009
2009
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less… (More)
  • figure 1
  • figure 2
  • table 1
Is this relevant?
2005
2005
Robust technological enforcement of DRM licenses assumes that the prevention of direct access to the raw bit representation of… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2001
2001
In this paper we describe an interface between intrusion detection systems and trusted system components. The approach presented… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
1995
1995
This is the first of three related papers exploring how contemporary computer architecture affects security. Key issues in this… (More)
  • figure 1
  • figure 2
Is this relevant?
1993
1993
The current paradigm for trusted computer syst,ems holds that trust is a property of a system. It is a. property that ca.n be… (More)
Is this relevant?
Highly Cited
1993
Highly Cited
1993
It's coming again, the new collection that this site has. To complete your curiosity, we offer the favorite guide to… (More)
Is this relevant?
1993
1993
This paper describes shortcomings in the current paradigm for multilevel secure (MLS) syst,ems, summarizes requirements for a.11… (More)
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
1989
1989
This paper describes a software development process for developing trusted systems under DOD-STD-2167A. The process is based on… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?