Security assurance

Results: 2582



#Item
21Security / Prevention / Cyberwarfare / Crime prevention / Cryptography / Information governance / National security / Service assurance / Computer security

BUGYO_Beyond-leaflet-start.pub

Add to Reading List

Source URL: projects.celtic-initiative.org

Language: English - Date: 2009-06-19 12:31:10
22Computer security / Security / Computing / Software testing / Security Target / Vulnerability / Evaluation Assurance Level / Kernel / Common Criteria / Open-source movement

Microsoft Word - Trusting_Developers_Whitepaper_cc-3.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-10 07:41:12
23Computing / Software / System software / Hardware virtualization / X86 virtualization / Virtual machine / Hypervisor / Hardware-assisted virtualization / Virtualization / Multilevel security / VM / Protection ring

Layered Assurance Scheme for Multi-Core Architectures J. Alves-Foss, X. He and J. Song Center for Secure and Dependable Systems University of Idaho ,[xhhe,song3202]@vandals.uidaho.edu

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:30
24Computer access control / Identity management / Computer security / Federated identity / Identity / Authentication / Notary / Packaging / Digital identity / Identity assurance

Digital ID final option appraisal

Add to Reading List

Source URL: blog.gov.je

Language: English - Date: 2016-07-07 06:54:47
25Computer access control / Computer security / Identity management / Identity / Equity / Federated identity / Security Assertion Markup Language / Open standard / Trust / Open Identity Exchange / Identity assurance

Final Trust Frameworkweb

Add to Reading List

Source URL: idfederation.org

Language: English - Date: 2014-05-12 11:22:58
26Software engineering / Software / Quality management / Software testing / Software review / Quality assurance / Hacking / Vulnerability / Code review / Coverity / Static program analysis / FindBugs

Collaborative Security Code-Review Towards Aiding Developers Ensure Software-Security Hala Assal∗, Jeff Wilson, Sonia Chiasson, and Robert Biddle School of Computer Science Carleton University Ottawa, Canada

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:45
27Standards organizations / Standards / Evaluation / Technology / Technical specifications / Reference / Accreditation / Quality assurance / Professional certification / American National Standards Institute / ISO/IEC JTC 1 / Cyber security standards

Base Standard Program Private Security Company Management Systems CB Application for Accreditation FA 5013

Add to Reading List

Source URL: www.anab.org

Language: English - Date: 2016-07-15 09:09:17
28Security / Computer security / Prevention / Data security / Crime prevention / Cryptography / National security / Vulnerability / Information security / Attack / Trusted computing base / Software security assurance

Security Watch Rebecca T. Mercuri Computer Security: Quality Rather than Quantity

Add to Reading List

Source URL: www.notablesoftware.com

Language: English - Date: 2007-02-28 16:29:24
29Computer security / Computing / Data security / Cryptography / Crime prevention / Tests / Common Criteria / Protection Profile / Security Target / Evaluation / Information security / Evaluation Assurance Level

Microsoft Word - CCBusinessUsersSeminarOutline.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:42:45
30Computer security / Security / Cryptography / Trusted computing / Computer network security / Secure communication / National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing base / Common Criteria / TCB / United States Department of Homeland Security

æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
UPDATE