Next-Generation Secure Computing Base

Results: 49



#Item
1Geography of California / Business / Microsoft / Central Valley / Davis /  California / University of California /  Davis / Kuali Foundation / Request for proposal / Next-Generation Secure Computing Base

ADMAN Board of Directors Meeting Minutes December 17, p.mRobert Mondavi Institute, Room 1207

Add to Reading List

Source URL: occr.ucdavis.edu

Language: English - Date: 2016-04-08 21:59:35
2Health informatics / Electronic health records / Health Insurance Portability and Accountability Act / Data protection / Protected health information / Medical privacy / Next-Generation Secure Computing Base / Privacy / Medical record / Information privacy / Health Information Technology for Economic and Clinical Health Act / National Provider Identifier

DOC Document

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2006-01-05 22:30:20
3information security technical report–138  available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htm

information security technical report–138 available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htm

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-01-05 23:25:04
4CHAPTER  18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 09:57:39
5To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004  Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael Hohmuth

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael Hohmuth

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:18
6Using the Palladium  TERMS AND CONDITIONS Revision Date: 5/8/12

Using the Palladium TERMS AND CONDITIONS Revision Date: 5/8/12

Add to Reading List

Source URL: www.mypalladium.org

Language: English - Date: 2012-09-18 11:59:50
7Trusted Computing and Free Software RMLL 2009 – Nantes Frédéric Guihéry AMOSSYS  July 9, 2009

Trusted Computing and Free Software RMLL 2009 – Nantes Frédéric Guihéry AMOSSYS July 9, 2009

Add to Reading List

Source URL: www.amossys.fr

Language: English - Date: 2012-07-25 04:35:25
8Certifying Program Execution with Secure Processors Benjie Chen Robert Morris MIT Laboratory for Computer Science {benjie,rtm}@lcs.mit.edu Abstract Cerium is a trusted computing architecture that protects

Certifying Program Execution with Secure Processors Benjie Chen Robert Morris MIT Laboratory for Computer Science {benjie,rtm}@lcs.mit.edu Abstract Cerium is a trusted computing architecture that protects

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2003-06-03 23:21:03
9Certifying Program Execution with Secure Processors Benjie Chen Robert Morris Laboratory for Computer Science

Certifying Program Execution with Secure Processors Benjie Chen Robert Morris Laboratory for Computer Science

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2003-05-28 11:51:35
10Trusted Platform Module (TPM)

Trusted Platform Module (TPM)

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-03-28 00:28:27