Trusted Computing

Results: 881



#Item
101TU_border_A4_portret_front

TU_border_A4_portret_front

Add to Reading List

Source URL: www.tbm.tudelft.nl

Language: English - Date: 2011-05-11 08:50:35
102Solving the Data Security Dilemma with Self-Encrypting Drives May 2010 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006

Solving the Data Security Dilemma with Self-Encrypting Drives May 2010 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2010-05-19 15:06:35
103Cloud Design Uses Enomaly ECP* for Platform Security

Cloud Design Uses Enomaly ECP* for Platform Security

Add to Reading List

Source URL: www.intel.com

Language: English - Date: 2014-03-01 18:42:02
104ARCHITECT’S GUIDE: ICS SECURITY USING TNC TECHNOLOGY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

ARCHITECT’S GUIDE: ICS SECURITY USING TNC TECHNOLOGY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2013-11-06 16:49:30
105An Overview of the Annex System D.A. Grove T.C. Murray  C.A. Owen C.J. North J.A. Jones M.R. Beaumont

An Overview of the Annex System D.A. Grove T.C. Murray C.A. Owen C.J. North J.A. Jones M.R. Beaumont

Add to Reading List

Source URL: www.acsac.org

Language: English - Date: 2007-12-17 22:49:19
106Another Way to Circumvent Intel® Trusted Execution Technology Tricking SENTER into misconfiguring VT-d via SINIT bug exploitation Rafal Wojtczuk   Joanna Rutkowska

Another Way to Circumvent Intel® Trusted Execution Technology Tricking SENTER into misconfiguring VT-d via SINIT bug exploitation Rafal Wojtczuk Joanna Rutkowska

Add to Reading List

Source URL: invisiblethingslab.com

Language: English - Date: 2009-12-21 13:05:46
107Trusted Computing Group Membership Agreement MEMBERSHIP CLASSIFICATION: ANNUAL MEMBERSHIP FEE

Trusted Computing Group Membership Agreement MEMBERSHIP CLASSIFICATION: ANNUAL MEMBERSHIP FEE

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2014-11-12 13:55:04
108Mathematically Verified Software Kernels: Raising the Bar for High Assurance Implementations Dr Daniel Potts, VP of Engineering, General Dynamics C4 Systems Rene Bourquin, Member Technical Staff, General Dynamics C4 Syst

Mathematically Verified Software Kernels: Raising the Bar for High Assurance Implementations Dr Daniel Potts, VP of Engineering, General Dynamics C4 Systems Rene Bourquin, Member Technical Staff, General Dynamics C4 Syst

Add to Reading List

Source URL: sel4.systems

Language: English - Date: 2014-07-28 22:03:39
109Naval Research Laboratory Washington, DC 20375*5000 NRL ReportA Framework for Evaluating Computer Architectures to

Naval Research Laboratory Washington, DC 20375*5000 NRL ReportA Framework for Evaluating Computer Architectures to

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:23
110TOWARD A COMPREHENSIVE INFOSEC CERTIFICATION METHODOLOGY  Charles N. Payne, Judith N. Froscher and Carl E. Landwehr Center for High Assurance Computing Systems Naval Research Laboratory Washington, D.C–5337

TOWARD A COMPREHENSIVE INFOSEC CERTIFICATION METHODOLOGY  Charles N. Payne, Judith N. Froscher and Carl E. Landwehr Center for High Assurance Computing Systems Naval Research Laboratory Washington, D.C–5337

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:26