Systems assurance

Results: 2132



#Item
61Identity management / Computer access control / Federated identity / Metadata standards / Identity assurance / SAML 2.0 / OpenID / Security Assertion Markup Language / Authentication / Identity provider / Privacy-enhancing technologies / Digital identity

Toward Mending Two Nation-Scale Brokered Identification Systems

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2015-05-15 18:39:32
62Computing / Security / Business / Computer network security / Cloud computing / Computer security / Cloud infrastructure / Multitenancy / Software as a service / Security controls

Ashit Vora Manager, Security Assurance, Cisco Systems, Inc. September 18, 2012 IT resources and services that are abstracted from the underlying

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2012-09-06 07:18:36
63Functional languages / Functional programming / Data types / Type theory / Procedural programming languages / Haskell / Syntax / Monad / Type system / ML / Programming language / Type class

The Habit Programming Language: The Revised Preliminary Report The High Assurance Systems Programming Project (Hasp) Department of Computer Science, Portland State University Portland, Oregon 97207, USA November 2010

Add to Reading List

Source URL: hasp.cs.pdx.edu

Language: English - Date: 2011-02-16 17:13:08
64Christianity / Enterprise architecture / Enterprise modelling / Information technology management / Software architecture / Auditing / Assurance / Evangelicalism / Lutheran theology / Argumentation theory / ArchiMate / Archi

ASSURE 2015: The 3rd International Workshop on Assurance Cases for Software-Intensive Systems Workshop Programme September 22, 2015 Delft, The Netherlands Tuesday, 22nd September 2015

Add to Reading List

Source URL: safecomp2015.tudelft.nl

Language: English - Date: 2015-09-14 10:24:23
65

2nd Symposium and Bootcamp on the Science of Security (HotSoS)
 April 21st, 2015 Integrity Assurance in Resource-Bounded Systems through Stochastic Message Authentication Aron Laszka, Yevgeniy Vorobeychik, and Xenofon

Add to Reading List

Source URL: aronlaszka.com

Language: English - Date: 2015-04-21 21:33:14
    66Computer access control / Identity management / Computer security / Identity / Federated identity / Metadata standards / Identity assurance / OpenID / SAML 2.0 / Security Assertion Markup Language / Identity provider / Authentication

    Toward Mending Two Nation-Scale Brokered Identification Systems

    Add to Reading List

    Source URL: petsymposium.org

    Language: English - Date: 2015-06-23 17:21:44
    67Safety engineering / Evaluation / Safety / Dependability / Quality / Security / Terraillon / Tea / Euthenics

    SASSUR 2015: The 4th International Workshop on Next Generation of System Assurance Approaches for safety-critical Systems Workshop Programme September 22, 2015 Delft, The Netherlands

    Add to Reading List

    Source URL: safecomp2015.tudelft.nl

    Language: English - Date: 2015-09-14 10:24:22
    68

    Where is the value in a Program Verifier? The Systems Assurance Group at QinetiQ in Malvern has used mechanical proof techniques to verify three successive versions of Typhoon’s flight control laws implemented in Ada.

    Add to Reading List

    Source URL: vstte.ethz.ch

    Language: English - Date: 2005-10-11 03:37:08
      69

      Whither Veri ed Software? Ramesh Bharadwaj Center for High Assurance Computer Systems Naval Research Laboratory Washington DCUSA

      Add to Reading List

      Source URL: vstte.ethz.ch

      Language: English - Date: 2005-10-11 03:37:02
        70

        Trusted Computing Exemplar (TCX) Project Objective Provide a working example showing how trusted computing systems and components can be constructed to meet high assurance evaluation criteria. Reference implementation co

        Add to Reading List

        Source URL: www.cisr.us

        Language: English - Date: 2007-11-15 12:21:22
          UPDATE