Modeling the trust boundaries created by securable objects