Computer security conference

Results: 514



#Item
331Xen / Virtual machines / Hyper-V / Paravirtualization / Hypervisor / Live migration / VM / Azure Services Platform / Cloud computing / System software / Software / University of Cambridge Computer Laboratory

Published in Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS’12), October[removed]Self-service Cloud Computing Shakeel Butt ´ Lagar-Cavilla

Add to Reading List

Source URL: lagarcavilla.org

Language: English - Date: 2012-08-01 18:17:46
332Computer security / Health informatics / Public administration / National Conference on Weights and Measures / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology

HIT Standards Committee Schedule for the Assessment of HIT Policy Committee Recommendations: The National Coordinator will establish priority areas based in part of recommendations received from the HIT Policy Committee

Add to Reading List

Source URL: healthit.gov

Language: English - Date: 2013-08-16 11:10:16
333United Kingdom / Corporate Ink / National security / BAE Systems / Computer security / Rolls-Royce plc / Transglobal Secure Collaboration Project / British brands / Manufacturing in the United Kingdom / Economy of the United Kingdom

TSCP Members Present at Defence IT 08 Breakthroughs in Secure Information Sharing on the Agenda LONDON (Feb. 20, 2008) — At this year’s Defence IT 08 conference, members of the Transglobal Secure Collaboration Progra

Add to Reading List

Source URL: www.tscp.org

Language: English - Date: 2013-09-16 22:05:48
334Computer security / Health informatics / Public administration / National Conference on Weights and Measures / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology

HIT Standards Committee Schedule for the Assessment of HIT Policy Committee Recommendations: The National Coordinator will establish priority areas based in part of recommendations received from the HIT Policy Committee

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2013-08-16 11:10:16
335Merchant marine / Transportation Worker Identification Credential / Government / United States maritime law / TWIC / Title 33 of the Code of Federal Regulations / Computer security / Security / Biometrics / Law enforcement in the United States

Transportation Worker Identification Credential (TWIC) Navigation and Vessel Inspection Circular (NVIC[removed]Summary AAPA Conference Call

Add to Reading List

Source URL: www.portofstockton.com

Language: English - Date: 2013-10-31 15:37:10
336Cyberterrorism / Cyberstalking / Computer fraud / Organized crime / Hacker / Malware / Computer security / Federal Bureau of Investigation / International Cybercrime / Cybercrime / Computer crimes / Crime

International Society for the Reform of Criminal Law 16th Annual Conference Technology and Its Effects on Criminal Responsibility, Security and Criminal Justice (December 6-10, 2002)

Add to Reading List

Source URL: www.isrcl.org

Language: English - Date: 2004-07-09 16:08:01
337Social psychology / Security / Espionage / Trust metric / Data fusion / Information integration / Trust / Computer security / Secure communication / Reputation management / Sociology / Ethics

Procedia Computer Science Volume 29, 2014, Pages 1299–1313 ICCS[removed]14th International Conference on Computational Science Static versus Dynamic Data Information Fusion analysis using DDDAS for Cyber Security Trust

Add to Reading List

Source URL: www.dddas.org

Language: English - Date: 2014-05-07 11:40:06
338Public safety / Infrastructure / Crime prevention / Security engineering / Critical infrastructure protection / Cyberwarfare / Critical infrastructure / Computer security / Information security / National security / Security / United States Department of Homeland Security

Meridian conference – 26 November[removed]Berlin Conference theme: CIIP policy challenges and common denominators Keynote title: government’s perspective Ladies and gentleman,

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-12-06 10:59:09
339Computing / Firewall / Ingate / SIP Trunking / SIP connection / Telephony / Electronic engineering / Videotelephony / Session border controller / Computer network security / Electronics / Ingate Systems

FOR IMMEDIATE RELEASE Ingate Systems to Present at WebRTC Conference & Expo

Add to Reading List

Source URL: www.ingate.com

Language: English - Date: 2013-10-30 08:08:48
340Computer security / Crime prevention / Information Risk Management / Computer crimes / Government Communications Headquarters / Information assurance / International Multilateral Partnership Against Cyber Threats / Information security / Risk / Security / Public safety / National security

CESG Agenda IA10 CONFERENCE SPECIAL EDITION Autumn[removed]A digital economy central to the country’s needs

Add to Reading List

Source URL: webarchive.nationalarchives.gov.uk

Language: English
UPDATE