Skip to search formSkip to main contentSkip to account menu

Trusted system

Known as: Trusted systems, Security envelopes, Security envelope 
In the security engineering subspecialty of computer science, a trusted system is a system that is relied upon to a specified extent to enforce a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
IEEE802.11 wireless networks have become one of the most widely used networks. Due to open nature of wireless medium, hackers and… 
2013
2013
Now-a-days Cryptographic smart cards are being used for most of the online transactions in many fields . But the security and the… 
2012
2012
We study ex-post hiring risks in low income countries with limited legal and regulatory frameworks. In our theory of employee… 
2011
2011
Context. It has been recently discovered that Cepheids harbor circumstellar envelopes (CSEs). RS Pup is the Cepheid that presents… 
2010
2010
We propose and implement a cloud architecture of virtual TPMs. In this architecture, TPM instances can be obtained from the TPM… 
Review
2006
Review
2006
Voting is an expressive act. Since people are not born wanting to express themselves politically, the desire to vote must be… 
2005
2005
This research investigates the increasingly complex issues confronted when implementing security in the mobile computing and… 
Review
2003
Review
2003
This chapter provides an overview of the field of rights expression languages RELs). It justifies the need for rights expression… 
2001
2001
Under current U.S. law and common understanding, the fundamental right granted by copyright is the right of reproduction -- of… 
1999
1999
  • C. O'Halloran
  • 1999
  • Corpus ID: 1119980
Any system constructed today is likely to be constructed from COTS components. Encapsulation of these components using software…