Security assurance

Results: 2582



#Item
161

Halo: High-Assurance Locate for Distributed Hash Tables∗ Apu Kapadia Institute for Security Technology Studies Dartmouth College Hanover, NH 03755, USA

Add to Reading List

Source URL: www.cs.bu.edu

- Date: 2009-01-20 23:47:20
    162

    National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE

    Add to Reading List

    Source URL: www.nsa.gov

    - Date: 2014-03-13 11:17:20
      163

      Mapping IDABC Authentication Assurance Levels to SAML V2.0 Konstantinos MOULINOS, Seconded National Expert Open Standards Forum 2008: Security

      Add to Reading List

      Source URL: events.oasis-open.org

      Language: English - Date: 2008-10-08 15:25:28
        164

        Security Requirements for Mobile Operating Systems Information Assurance Directorate 25 January 2013 Version 1.0

        Add to Reading List

        Source URL: www.niap-ccevs.org

        Language: English - Date: 2013-03-01 07:14:56
          165

          Common Criteria for Information Technology Security Evaluation Part 3: Security assurance components September 2012

          Add to Reading List

          Source URL: www.ipa.go.jp

          Language: English - Date: 2014-07-11 01:14:25
            166

            National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE

            Add to Reading List

            Source URL: www.nsa.gov

            Language: English - Date: 2015-04-29 13:43:02
              167

              Job Corps: Increasing Oversight and Focusing on Quality Assurance The safety and security of Job Corps students and employees is a top program priority. Job Corps is committed to serving young people who are overcoming h

              Add to Reading List

              Source URL: www.dol.gov

              Language: English - Date: 2015-02-13 16:39:01
                168

                1999 Paper 9 Question 15 Security Give examples of the use of a block cipher to provide assurance of (a) confidentiality (b) integrity

                Add to Reading List

                Source URL: www.cl.cam.ac.uk

                - Date: 2014-06-09 10:17:32
                  169

                  Common Criteria for Information Technology Security Evaluation Part 3: Security assurance components July 2009

                  Add to Reading List

                  Source URL: www.commoncriteriaportal.org

                  Language: English - Date: 2011-10-31 18:14:56
                    170

                    Information Assurance: Best Practices Fiona Pattinson Payment Security Training Conference - Beijing, China Feb 28th, 2014 © atsec information security, 2014

                    Add to Reading List

                    Source URL: www.atsec.cn

                    Language: English - Date: 2014-03-04 22:20:05
                      UPDATE