Next-Generation Secure Computing Base

Results: 49



#Item
21Ethics / Next-Generation Secure Computing Base / Digital rights management / Trusted Platform Module / Information Rights Management / Z / Privacy / Digital rights / Trusted Computing Group / Computer security / Trusted computing / Copyright law

Microsoft PowerPoint - Mason Trusted Computing & Integrity of Govt-held Info.ppt

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 01:39:58
22Trusted computing / Identity management / Cryptography / Procfs / Unix / Next-Generation Secure Computing Base / Kernel / Nexus / Trusted Platform Module / Computer architecture / Software / System software

Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2011-09-24 15:57:36
23Disk encryption / Cryptographic software / Windows Vista / Trusted computing / Windows Server / BitLocker Drive Encryption / Trusted Platform Module / Next-Generation Secure Computing Base / Encrypting File System / Microsoft Windows / System software / Software

Secure Startup–Full Volume Encryption: Technical Overview - 20

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2006-06-22 16:03:10
24Computer security / Information technology management / Trustworthy computing / Software / Cloud computing / Next-Generation Secure Computing Base / Microsoft / Computing / Security

----Original Message----- From: Bill Gates Sent: Tuesday, January 15, 2002 2:22 PM To: Microsoft and Subsidiaries: All FTE Subject: Trustworthy computing Every few years I have sent out a memo talking about the highest

Add to Reading List

Source URL: www.microsoft.com

Language: English - Date: 2005-07-26 17:01:21
25NEXUS / Political geography / Next-Generation Secure Computing Base / Government / International relations / Canada–United States border / Borders of the United States / United States Department of Homeland Security

Back to A NEXUS pass saved me 3 hours at the border A NEXUS pass saved me 3 hours at the border September 30, 2011 A Nexus pass makes border crossings faster and easier.

Add to Reading List

Source URL: www.peacebridge.com.php54-2.ord1-1.websitetestlink.com

Language: English - Date: 2014-08-19 13:53:58
26Trusted Platform Module / Trusted Computing Group / Next-Generation Secure Computing Base / Trusted Execution Technology / TPM / Random oracle / Secure two-party computation / Direct Anonymous Attestation / Computer security / Trusted computing / Cryptography

Exploring Trusted Platform Module Capabilities: A Theoretical and Experimental Study

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2011-12-22 15:11:06
27Virtual machines / Trusted computing / Programming language implementation / VM / Hypervisor / Operating system / Computing platform / Next-Generation Secure Computing Base / Microkernel / System software / Software / VMware

Terra: A Virtual Machine-Based Platform for Trusted Computing Tal Garfinkel Ben Pfaff Jim Chow Mendel Rosenblum

Add to Reading List

Source URL: benpfaff.org

Language: English - Date: 2014-11-24 21:25:49
28Security / Disk encryption / Trusted Platform Module / Trusted Execution Technology / Next-Generation Secure Computing Base / Ring / Security token / Physical Unclonable Function / Trusted computing base / Computer security / Trusted computing / Cryptography

INVITED PAPER Mobile Trusted Computing This paper surveys the trusted computing features in mobile computing platforms. By N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos Rozas,

Add to Reading List

Source URL: rebootingcomputing.ieee.org

Language: English - Date: 2014-08-25 09:54:55
29Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Next-Generation Secure Computing Base / Counter / Cryptographic hash function / Extensible Storage Engine / Computer security / Trusted computing / Cryptography

Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR[removed]September 11, 2006

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2006-09-12 07:35:22
30Error detection and correction / Cryptography / Cryptographic hash functions / Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Next-Generation Secure Computing Base / Counter / Hash tree / Computer security / Trusted computing / Hashing

Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS ∗ Luis F. G. Sarmenta, Marten van Dijk, Charles W. O’Donnell, Jonathan Rhodes, and Srinivas Devadas

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2006-08-31 18:21:40
UPDATE