Trusted Computing Group

Results: 147



#Item
71Unified Extensible Firmware Interface / Computer architecture / Computer hardware / Vmlinux / Trusted computing / Linux / BIOS / Booting / System software

Extending secure boot to user space with Linux Integrity Subsystem Dmitry Kasatkin Integrity subsystem developer/co-maintainer [removed] Samsung Open Source Group

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2014-10-09 09:12:19
72Cryptographic software / Trusted computing / BitLocker Drive Encryption / Windows 7 / Windows Server / Software / Provisioning / Trusted Platform Module / Trusted Computing Group / Computer security / Microsoft Windows / Disk encryption

Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing

Add to Reading List

Source URL: www.fbcinc.com

Language: English - Date: 2014-02-04 12:36:02
73Computing / Cryptography / Disk encryption / Hardware-based full disk encryption / Trusted Computing Group / FIPS 140-2 / FIPS 140 / Parallel ATA / Trusted Computing / Computer hardware / Cryptography standards / Computer security

Microsoft Word - 9f - Seagate Secure® TCG Opal SSC SED FIPS[removed]Module Security Policy rev 1.4.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-08 10:58:40
74Trusted Platform Module / Trusted Computing Group / Next-Generation Secure Computing Base / Trusted Execution Technology / TPM / Random oracle / Secure two-party computation / Direct Anonymous Attestation / Computer security / Trusted computing / Cryptography

Exploring Trusted Platform Module Capabilities: A Theoretical and Experimental Study

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2011-12-22 15:11:06
75Software / Computing / Computer programming / ODBC

QSS and Minisoft Breathe New Life Into A Trusted Legacy Platform. “QSS demonstrated the new Employee Self Service web-based applica�on (ESS) at the QSS Users Group conference in March[removed]The

Add to Reading List

Source URL: www.minisoft.com

Language: English
76Security / FIPS 140 / Trusted Computing Group / Trusted Computing / Critical Security Parameter / Authentication / Zeroisation / Key management / Cryptography / Computer security / Cryptography standards

Microsoft Word - 2o - Security Policy KCF-1.2 .doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-09 11:11:13
77Data security / Crime prevention / National security / Cryptography / Trusted Computing Group / Trusted Computing / Information security management system / Trusted Platform Module / Vulnerability / Computer security / Security / Cyberwarfare

ENISA Quarterly Review Vol. 4, No. 4, Oct-Dec 2008 IN THIS EDITION A Letter from the Executive Director

Add to Reading List

Source URL: www.warp.gov.uk

Language: English - Date: 2014-09-22 09:11:24
78Virtual machines / Multilevel security / Virtualization / Virtuality / Trusted Computing Group / Ring / Hypervisor / Virtual private network / Intel vPro / System software / Computing / Software

Secure Virtualization: Today’s Reality Secure virtualization is an exciting new technology that allows you to secure your computing systems, networks, and data while simultaneously remaining connected to trusted and un

Add to Reading List

Source URL: www.gdc4s.com

Language: English - Date: 2014-12-03 04:04:56
79National security / Public safety / Trusted computing / Cryptography / Trusted Platform Module / Computer network security / Corporate Ink / Trusted Computing Group / Information security / Security / Computer security / Crime prevention

Wave Systems Joins TSCP Membership Grows As Solutions Providers Commit to Driving Adoption of Secure Information Sharing Standards HERNDON, Va. (Dec. 21, 2009) ─ Wave Systems Corp. (NASDAQ: WAVX -- www.wave.com), a lea

Add to Reading List

Source URL: www.tscp.org

Language: English - Date: 2013-09-16 22:08:03
80Identity Commons / Internet Governance Forum / Stakeholder / Governance / Liberty Alliance / Working group / Computing / Political science / Internet / Computer network security / National Strategy for Trusted Identities in Cyberspace / Internet governance

Microsoft Word - Identity Commons_NSTIC Governance NOI[removed]Response.docx

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-09-13 08:46:56
UPDATE