Security assurance

Results: 2582



#Item
1DANFENG (DAPHNE) YAO RESEARCH INTERESTS Software and system security and assurance, including anomaly detection in networked systems and programs, system integrity, malware program analysis, security of mobile systems, c

DANFENG (DAPHNE) YAO RESEARCH INTERESTS Software and system security and assurance, including anomaly detection in networked systems and programs, system integrity, malware program analysis, security of mobile systems, c

Add to Reading List

Source URL: people.cs.vt.edu

Language: English - Date: 2018-04-09 14:09:44
    2Auditor Information Security Passion for Quality and Safety! The team Business Assurance focuses on auditing management systems for various businesses and markets. Auditing is done for example against international stand

    Auditor Information Security Passion for Quality and Safety! The team Business Assurance focuses on auditing management systems for various businesses and markets. Auditing is done for example against international stand

    Add to Reading List

    Source URL: werkenbijdekra.nl

    - Date: 2016-09-01 08:33:10
      3National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme CCEVS Position Statement USB Portable Storage Device Essential Security Requirements version 2.0, dated 28 October 2013

      National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme CCEVS Position Statement USB Portable Storage Device Essential Security Requirements version 2.0, dated 28 October 2013

      Add to Reading List

      Source URL: www.commoncriteriaportal.org

      - Date: 2014-01-15 13:26:10
        4IWSAC4th INTERNATIONAL WORKSHOP ON SECURITY ASSURANCE IN THE CLOUD (IWSACCollocated with: SITISThe 12h International Conference on Signal Image Technology & Internet based Systems

        IWSAC4th INTERNATIONAL WORKSHOP ON SECURITY ASSURANCE IN THE CLOUD (IWSACCollocated with: SITISThe 12h International Conference on Signal Image Technology & Internet based Systems

        Add to Reading List

        Source URL: www.sitis-conf.org

        - Date: 2016-05-13 08:34:54
          5NASA’s IV&V Program Safety and Mission Assurance (SMA) Office Information Assurance/Cybersecurity Support Addressing SW Security

          NASA’s IV&V Program Safety and Mission Assurance (SMA) Office Information Assurance/Cybersecurity Support Addressing SW Security

          Add to Reading List

          Source URL: ntrs.nasa.gov

          - Date: 2015-12-30 05:30:07
            6LYNKS Series II HSM TM High-Assurance Hardware Security Module Features  Password required to unlock user’s private keys.

            LYNKS Series II HSM TM High-Assurance Hardware Security Module Features  Password required to unlock user’s private keys.

            Add to Reading List

            Source URL: www.spyrus.com

            - Date: 2015-08-05 12:28:13
              7TYLER MOORE Tandy Assistant Professor of Cyber Security and Information Assurance University of Tulsa, Tulsa, OKemail:  http://tylermoore.ens.utulsa.edu/ tel: +

              TYLER MOORE Tandy Assistant Professor of Cyber Security and Information Assurance University of Tulsa, Tulsa, OKemail: http://tylermoore.ens.utulsa.edu/ tel: +

              Add to Reading List

              Source URL: tylermoore.ens.utulsa.edu

              Language: English - Date: 2016-03-24 11:13:01
              830-NovMilestone MNA3.1: Recommendations on Minimal Assurance Level Relevant for Low-risk Research Use Cases

              30-NovMilestone MNA3.1: Recommendations on Minimal Assurance Level Relevant for Low-risk Research Use Cases

              Add to Reading List

              Source URL: aarc-project.eu

              Language: English - Date: 2016-07-21 05:59:15
              9Sertifiseringsmyndigheten for IT-sikkerhet Norwegian Certification Authority for IT Security  SERTIT-012 CR Certification Report IssueMarchThales Operator Terminal Adapter

              Sertifiseringsmyndigheten for IT-sikkerhet Norwegian Certification Authority for IT Security SERTIT-012 CR Certification Report IssueMarchThales Operator Terminal Adapter

              Add to Reading List

              Source URL: sertit.no

              Language: English - Date: 2013-09-19 06:43:32
              10Security as a Practical Problem: Some Preliminary Observations of Everyday Mental Models Paul Dourish, Jessica Delgado de la Flor, and Melissa Joseph School of Information and Computer Science University of California, I

              Security as a Practical Problem: Some Preliminary Observations of Everyday Mental Models Paul Dourish, Jessica Delgado de la Flor, and Melissa Joseph School of Information and Computer Science University of California, I

              Add to Reading List

              Source URL: www.andrewpatrick.ca

              Language: English - Date: 2003-01-16 18:02:06