Trusted Computing Group

Results: 147



#Item
21Security / Cyberwarfare / FIPS 140 / Trusted Computing Group / Critical Security Parameter / Trusted Computing / Authentication / Zeroisation / Key management / Computer security / Cryptography standards / Cryptography

Microsoft Word - 22e - Security Policy APK-0.6.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 15:49:37
22NVM Express / Solid-state drive / Serial ATA / PCI Express / IOPS / Advanced Host Controller Interface / SCSI / Trusted Computing Group / Computer hardware / Computing / Computer storage

NVM Express Q&A February 12, 2014 Q1: What is NVM Express? A1: NVM Express, informally NVMe, is an interface specification optimized for PCI Express® based solid state drives. The interface is defined in a scalable mann

Add to Reading List

Source URL: www.nvmexpress.org

Language: English - Date: 2014-07-02 17:49:02
23Trusted computing / Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Xen / Ring / Paravirtualization / Virtual machine / Rootkit / System software / Computer security / Software

TOCTOU, Traps, and Trusted Computing Sergey Bratus, Nihal D’Cunha, Evan Sparks, and Sean W. Smith Dartmouth College, Hanover, New Hampshire Abstract. The security of the standard TCG architecture depends on whether th

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2009-11-12 16:20:18
24Trusted Computing Group / Trusted Platform Module / Cryptography / Rootkit / Computer security / Cyberwarfare / Trusted computing

The Diversity of TPMs and its Effects on Development A Case Study of Integrating the TPM into OpenSolaris ∗ Anna Shubina

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-11-09 19:13:24
25National security / Ethics / Cryptography / Trusted Computing Group / Trusted Computing / Privacy / Intel / European Network and Information Security Agency / Information security / Security / Computer security / Crime prevention

Claire Vishik Trust & Security Technology & Policy Manager Intel Corporation Dr. Claire Vishik works at Intel Corporation focuses on hardware security, trusted computing, privacy enhancing technologies, some aspects of e

Add to Reading List

Source URL: www.trustindigitallife.eu

Language: English - Date: 2015-03-19 08:36:15
26Certificate authority / Peer-to-peer / Revocation list / Man-in-the-middle attack / Public key certificate / Public key infrastructure / Trusted Computing Group / Trusted Computing / Trusted Execution Technology / Cryptography / Public-key cryptography / Key management

Int. J. Inf. SecurDOIs10207x S P E C I A L I S S U E PA P E R Gabriel Vanrenen · Sean Smith · John Marchesini

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:23:27
27Legal entities / Structure / Nonprofit organization / Corporation / Business / Income tax in the United States / Types of business entity / Business law / Corporations law

ARTICLES OF INCORPORATION OF Trusted Computing Group (an Oregon Nonprofit Corporation) The undersigned individual 18 years of age or older, acting as incorporator under the Oregon Nonprofit Corporation Act, adopts the fo

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-04-12 17:38:22
28Next-Generation Secure Computing Base / Trusted Execution Technology / Trusted Network Connect / Trusted Computing Group / Computer security / Trusted computing / Trusted Platform Module

Trusted Computing and Free Software RMLL 2009 – Nantes Frédéric Guihéry AMOSSYS July 9, 2009

Add to Reading List

Source URL: www.amossys.fr

Language: English - Date: 2012-07-25 04:35:25
29Cloud infrastructure / Trusted computing / Semiconductor companies / Server hardware / IBM cloud computing / Trusted Execution Technology / Intel / Trusted Computing Group / IBM System x / Cloud computing / Computing / Computer security

PDF Document

Add to Reading List

Source URL: www.intel.de

Language: English - Date: 2014-03-01 01:08:58
30Law / Private law / Board of directors / Business law / Committees / Management / Corporate law / Heights Community Council / Public Interest Declassification Board / Business / Corporate governance / Corporations law

BYLAWS OF TRUSTED COMPUTING GROUP (An Oregon Nonprofit Corporation) Adopted 26 Feb 2003 As Amended through JulyARTICLE 1: DEFINITIONS

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2012-07-26 13:53:17
UPDATE