Next-Generation Secure Computing Base

Results: 49



#Item
41Trusted Execution Technology / Trusted computing base / Trusted Computer System Evaluation Criteria / TCB / Microkernel / Operating system / Secure environment / Next-Generation Secure Computing Base / Computer security / Trusted computing / Trusted Platform Module

Dynamic Root of Trust in Trusted Computing Cong Nie Helsinki University of Technology

Add to Reading List

Source URL: www.tml.tkk.fi

Language: English - Date: 2008-01-03 05:01:33
42Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / StrongSwan / Rapperswil / Next-Generation Secure Computing Base / Computer security / Trusted computing / Cryptography

A Root of Trust for Measurement

Add to Reading List

Source URL: security.hsr.ch

Language: English - Date: 2011-06-19 04:27:15
43Virtual machines / Trusted computing / Programming language implementation / VM / Hypervisor / Operating system / Computing platform / Next-Generation Secure Computing Base / Microkernel / System software / Software / VMware

Terra: A Virtual Machine-Based Platform for Trusted Computing Tal Garfinkel  

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2003-08-13 12:51:07
44Computer network security / Trusted Computing Group / Password / Trusted Computing / Security token / Digital rights management / Malware / Next-Generation Secure Computing Base / Computer security / Copyright law / Security

The Need for TCPA David Safford, IBM Research, October, 2002

Add to Reading List

Source URL: www.research.ibm.com

Language: English - Date: 2003-04-16 11:17:28
45Computing / Cryptography / Business law / Copyright law / Next-Generation Secure Computing Base / Trusted Platform Module / Trusted system / X Window System / Microkernel / Computer security / Trusted computing / Software

PDF Document

Add to Reading List

Source URL: www.vivekhaldar.com

Language: English - Date: 2005-12-09 20:49:49
46Copyright law / Next-Generation Secure Computing Base / Trusted Platform Module / Digital rights management / Tamper resistance / Ringtone / Copy protection / Computer security / Trusted computing / Cryptography

PDF Document

Add to Reading List

Source URL: www.research.ibm.com

Language: English - Date: 2003-04-16 11:17:27
47Watermarking / Copyright law / Security / Analog hole / Watermark / Copy protection / Next-Generation Secure Computing Base / Digital watermarking / OMA DRM / Digital rights management / Computer security / Cryptography

PDF Document

Add to Reading List

Source URL: www.hpl.hp.com

Language: English - Date: 2003-06-30 17:26:31
48Disk encryption / Trusted Platform Module / Trusted Computing Group / Booting / Initrd / Trusted Execution Technology / Next-Generation Secure Computing Base / Computer security / Trusted computing / Cryptography

PDF Document

Add to Reading List

Source URL: elinux.org

Language: English - Date: 2012-11-01 14:36:29
49Trusted Platform Module / Trusted computing base / Ring / Public key infrastructure / Computing / Trustworthy computing / Computer security / Trusted computing / Next-Generation Secure Computing Base

PDF Document

Add to Reading List

Source URL: liedra.net

Language: English - Date: 2011-01-29 07:16:34
UPDATE