Trusted Computing Group

Results: 147



#Item
11

Solving the Data Security Dilemma with Self-Encrypting Drives May 2010 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2010-05-19 15:06:35
    12

    BYLAWS OF TRUSTED COMPUTING GROUP (An Oregon Nonprofit Corporation) Adopted 26 Feb 2003 As Amended through JulyARTICLE 1: DEFINITIONS

    Add to Reading List

    Source URL: www.trustedcomputinggroup.org

    - Date: 2012-07-26 13:53:17
      13

      ARTICLES OF INCORPORATION OF Trusted Computing Group (an Oregon Nonprofit Corporation) The undersigned individual 18 years of age or older, acting as incorporator under the Oregon Nonprofit Corporation Act, adopts the fo

      Add to Reading List

      Source URL: www.trustedcomputinggroup.org

      Language: English - Date: 2009-04-12 17:38:22
        14

        BYLAWS OF TRUSTED COMPUTING GROUP (An Oregon Nonprofit Corporation) Adopted 26 Feb 2003 As Amended through JulyARTICLE 1: DEFINITIONS

        Add to Reading List

        Source URL: www.trustedcomputinggroup.org

        Language: English - Date: 2012-12-17 14:49:17
          15Cloud infrastructure / Trusted computing / Semiconductor companies / Server hardware / IBM cloud computing / Trusted Execution Technology / Intel / Trusted Computing Group / IBM System x / Cloud computing / Computing / Computer security

          Vendor Spotlight OCTOBER 2012 IBM Offers Cloud Security for a Smarter Planet

          Add to Reading List

          Source URL: www.intel.com

          Language: English - Date: 2015-01-09 15:28:45
          16Microsoft Windows / Trusted computing / Trusted Platform Module / Cryptographic software / Trusted Computing Group / Hardware-based full disk encryption / Data security / Encryption / FIPS 140-2 / Cryptography / Computer security / Disk encryption

          Solving the Data Security Dilemma with Self-Encrypting Drives May 2010 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006

          Add to Reading List

          Source URL: www.trustedcomputinggroup.org

          Language: English - Date: 2010-05-19 15:06:35
          17Trusted computing / Virtual machines / Trusted Execution Technology / x86 architecture / Trusted Computing Group / Trusted Platform Module / Xen / Dell PowerEdge / Embedded hypervisor / System software / Computing / Software

          Cloud Design Uses Enomaly ECP* for Platform Security

          Add to Reading List

          Source URL: www.intel.com

          Language: English - Date: 2014-03-01 18:42:02
          18Technology / Trusted computing / Telemetry / Network architecture / Trusted Network Connect / IF-MAP / SCADA / Control system security / Trusted Computing Group / Computer security / Computer network security / Computing

          ARCHITECT’S GUIDE: ICS SECURITY USING TNC TECHNOLOGY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

          Add to Reading List

          Source URL: www.trustedcomputinggroup.org

          Language: English - Date: 2013-11-06 16:49:30
          19Trusted Computing / Maintenance fee / Business / Computer security / Trusted Computing Group / Law

          Trusted Computing Group Membership Agreement MEMBERSHIP CLASSIFICATION: ANNUAL MEMBERSHIP FEE

          Add to Reading List

          Source URL: www.trustedcomputinggroup.org

          Language: English - Date: 2014-11-12 13:55:04
          20Anonymity / Public-key cryptography / Group signature / Security token / Internet privacy / User / Blacklist / Trusted Computing / Digital credential / Cryptography / Privacy-enhancing technologies / Pseudonymity

          Formalizing Anonymous Blacklisting Systems1 Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

          Add to Reading List

          Source URL: www.cypherpunks.ca

          Language: English - Date: 2011-03-09 14:36:12
          UPDATE