Next-Generation Secure Computing Base

Results: 49



#Item
31Cryptography / Trusted Platform Module / Next-Generation Secure Computing Base / Cloud computing / Node / Eucalyptus / Public-key cryptography / Computer security / Trusted computing / Computing

Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services Nuno Santos, Rodrigo Rodrigues†, Krishna P. Gummadi, Stefan Saroiu‡ MPI-SWS, † CITI/Universidade Nova de Lisboa, ‡ Microsoft Research Abst

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2012-07-17 05:59:19
32Central processing unit / Physical Unclonable Function / Randomness / Trusted computing / Parallel computing / Ring / Memory management unit / Kernel / Next-Generation Secure Computing Base / Computing / Computer architecture / Computer hardware

Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions G. Edward Suh, Charles W. O’Donnell, Ishan Sachdev, and Srinivas Devadas Computer Science and Artificial Intelligence

Add to Reading List

Source URL: csg.csail.mit.edu

Language: English - Date: 2005-04-24 19:19:10
33Business law / Copyright law / Cryptography / Eben Moglen / Next-Generation Secure Computing Base / Free Software Foundation / Trustworthy computing / Operating system / Microsoft / Computer security / Computing / Trusted computing

Free Software Matters: Untrustworthy Computing Eben Moglen∗ August 11, 2002 “Ideas are not often hard,” the great American judge Oliver Wendell

Add to Reading List

Source URL: moglen.law.columbia.edu

Language: English - Date: 2003-01-18 20:33:06
34Trusted computing / Hardware security module / Secure cryptoprocessor / Automated teller machine / EMV / Next-Generation Secure Computing Base / Smart card / Trusted Platform Module / Security of automated teller machines / Cryptography / Computer security / Espionage

CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 09:57:39
35Business law / Copyright law / Cryptography / Eben Moglen / Next-Generation Secure Computing Base / Free Software Foundation / Trustworthy computing / Operating system / Microsoft / Computer security / Computing / Trusted computing

Free Software Matters: Untrustworthy Computing Eben Moglen∗ August 11, 2002 “Ideas are not often hard,” the great American judge Oliver Wendell

Add to Reading List

Source URL: emoglen.law.columbia.edu

Language: English - Date: 2003-01-18 20:33:06
36Trusted computing / Microkernel / Security / Trusted computing base / Kernel / Trusted path / L4 microkernel family / Next-Generation Secure Computing Base / Ring / Computer security / Computer architecture / System software

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components —

Add to Reading List

Source URL: os.inf.tu-dresden.de

Language: English - Date: 2004-08-02 05:13:46
37Cryptography / Next-Generation Secure Computing Base / Advanced Micro Devices / Trustworthy computing / Trusted Platform Module / Trusted Execution Technology / Computer security / Trusted computing / Trusted Computing Group

AMD’s Vision for Trustworthy Computing

Add to Reading List

Source URL: www.ic.unicamp.br

Language: English - Date: 2006-10-26 13:04:44
38Trusted Platform Module / Tamper resistance / Trusted Execution Technology / Next-Generation Secure Computing Base / Computer security / Cryptography / Trusted computing

Chapter 7 Introduction to the TPM

Add to Reading List

Source URL: courses.cs.vt.edu

Language: English - Date: 2010-02-08 17:06:48
39Trusted Computing Group / Trusted Execution Technology / GlobalPlatform / Ring / BitLocker Drive Encryption / Next-Generation Secure Computing Base / Computer security / Trusted computing / Trusted Platform Module

WHITE PAPER: TPM MOBILE with Trusted Execution Environment for Comprehensive Mobile Device Security

Add to Reading List

Source URL: www.globalplatform.org

Language: English - Date: 2013-04-11 18:26:33
40Computing / Linux kernel / Cryptography / Trusted Platform Module / Next-Generation Secure Computing Base / Rootkit / Integrity / Vmlinux / Loadable kernel module / Computer security / Security / Trusted computing

USENIX Association Proceedings of the

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2004-07-27 13:47:41
UPDATE