Back to Results
First PageMeta Content
Trusted computing / Espionage / Trusted Platform Module / Coprocessor / Tamper resistance / Kernel / Integrity / IBM / Secure cryptoprocessor / Computer security / Security / Cryptography


SECURITY Magic Boxes and Boots: Security in Hardware
Add to Reading List

Document Date: 2005-08-19 15:35:31


Open Document

File Size: 524,22 KB

Share Result on Facebook

City

Washington / DC / Toronto / Reading / /

Company

IBM / Protecting Externally Supplied Software / Los Alamos National Laboratory / Distributed Systems / IEEE CS Press / LogarithmicSpace Secure Hardware / Aegis / Microsoft / Trusted Computing Group / /

Currency

USD / /

/

Facility

Citadel Architecture / Carnegie Mellon University / College Park / TPM library / building CPUs / University of Maryland / Laboratory of Computer Science / /

IndustryTerm

security applications / secure systems / server software / Web environment / seen computer hardware / particular software stack / seen software / secure hardware / Web user / software component / software development / handheld computing device / follow-on product / suspicious software developers / remote server / secure coprocessor applications / software stack / software protection / Web Servers / appropriate software stack / software / application software / security services / cryptographic hardware / computer-based product / even suggested using hardware / nextgeneration crypto accelerator product / memory management / them—as technology / internal applications / /

OperatingSystem

Mac OS X / Linux / Microsoft Windows / /

Organization

University of Maryland / National Science Foundation / Trusted Computing Platform Alliance / Carnegie Mellon Univ. / MIT / Dartmouth College / Laboratory of Computer Science / School of Computer Science / Cyber Security and Trust Research Center / Carnegie Mellon University / Institute for Security Technology Studies / Stanford / /

Person

Paul Clark / Doug Tygar / Ruby Lee / Bill Arbaugh / W.A. Arbaugh / D.J. Farber / Sean Smith / Steve White / Liam Comerford / Oded Goldreich / Lance Hoffman / Nao Itoi / Steve Kent / J.M. Smith / N. Itoi / Robert Best / Dmitri Asonov / Bennet Yee / William A. Arbaugh / Contest / /

Position

Editor / text editor / researcher / Premier / published device driver / Private Information Storage / director / representative / professor of computer science / Private Information Retrieval / /

Product

Security / Security services / /

ProgrammingLanguage

RC / R / C / L / DC / /

Technology

RAM / Linux / smart card / private key / Operating System / html / SSL / CGI / Encryption / http / Simulation / virtual memory / binding the Secure Sockets Layer private key / /

URL

www.computer / www.acsac / /

SocialTag