Security kernel

Results: 400



#Item
261Computer security / FIPS 140-2 / FIPS 140 / PCI Express / Security token / Hardware security module / Linux kernel / Memory protection / Kernel / Cryptography standards / Computing / Security

nShield Security Policy ™ CI PHE R

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-01-28 00:00:00
262FreeBSD / Linux kernel / Loadable kernel module / X Window System / Database management systems / Software / System software / Computing

DP STD No[removed]Security Overview[removed])

Add to Reading List

Source URL: ags.hawaii.gov

Language: English - Date: 2012-11-28 13:43:43
263Process / Concurrent computing / Thread / Concurrency control / Scheduling / Kernel / Fork / Microkernel / OpenMP / Computing / Computer architecture / Computer programming

Efficient System-Enforced Deterministic Parallelism Amittai Aviram, Shu-Chun Weng, Sen Hu, Bryan Ford Yale University Abstract Deterministic execution offers many benefits for debugging, fault tolerance, and security. Cu

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2010-09-29 09:32:27
264Linux / Red Hat Enterprise Linux / Evaluation / Security-Enhanced Linux / Mandatory access control / Linux kernel / Evaluation Assurance Level / Security-focused operating system / Red Hat cluster suite / Computer security / Software / Red Hat

Red Hat Enterprise Linux Security © 2009 specialized copyright information. If none, please delete this textbox. www.redhat.com

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2009-10-06 10:21:41
265System software / Access token / Computer security / Windows Vista / Thread / Process / Kernel / Concurrency control / Mandatory Integrity Control / Microsoft Windows / Computing / Concurrent computing

Protected Processes - 5 Protected Processes November 27, 2006

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2006-11-30 16:47:48
266Error detection and correction / Cryptographic hash functions / Internet protocols / Internet standards / Secure communication / SHA-2 / FIPS 140-2 / SHA-1 / Advanced Encryption Standard / Cryptography / Computing / Cryptography standards

Microsoft Word - 01j - 1B - Axway Security Kernel FIPS[removed]Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-12 10:17:29
267FIPS 140 / Cryptographic Module Validation Program / Advanced Encryption Standard / Critical Security Parameter / Microsoft CryptoAPI / Cryptography standards / Cryptography / FIPS 140-2

Microsoft Word - 01g - CMSP McAfee Core CM _kernel_ v7 014.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-12 12:00:41
268Computing / Cryptographic hash functions / Cryptographic software / Internet protocols / Advanced Encryption Standard / SHA-2 / HMAC / FIPS 140-2 / SHA-1 / Cryptography / Error detection and correction / Cryptography standards

Samsung Kernel Cryptographic Module FIPS[removed]Non-Proprietary Security Policy version 1.9 Last Update: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-19 13:05:55
269Linux / Computer network security / Central processing unit / Ring / Kernel / Linux kernel / BIOS / Cyberwarfare / System Management Mode / Computer architecture / System software / Software

2013 DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP Frontiers in Cyber Security: Beyond the OS

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2013-08-05 14:03:50
270Computing / Computer network security / Evaluation Assurance Level / Computer security / Kernel / Common Criteria / Linux kernel / Evaluation / Software / Security

Sertifiseringsmyndigheten for IT-sikkerhet Norwegian Certification Authority for IT Security SERTIT-012 MR Maintenance Report Issue 4.0, 29 April[removed]Thales Operator Terminal Adapter (OTA)

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2014-04-29 04:33:38
UPDATE