Trusted Computing

Results: 881



#Item
101Trusted computing / Education / Academia / Technology / Cryptography / Total productive maintenance / Trusted Platform Module / Delft University of Technology / Queensland University of Technology / Faculty of Technology /  Policy and Management

TU_border_A4_portret_front

Add to Reading List

Source URL: www.tbm.tudelft.nl

Language: English - Date: 2011-05-11 08:50:35
102Microsoft Windows / Trusted computing / Trusted Platform Module / Cryptographic software / Trusted Computing Group / Hardware-based full disk encryption / Data security / Encryption / FIPS 140-2 / Cryptography / Computer security / Disk encryption

Solving the Data Security Dilemma with Self-Encrypting Drives May 2010 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2010-05-19 15:06:35
103Trusted computing / Virtual machines / Trusted Execution Technology / x86 architecture / Trusted Computing Group / Trusted Platform Module / Xen / Dell PowerEdge / Embedded hypervisor / System software / Computing / Software

Cloud Design Uses Enomaly ECP* for Platform Security

Add to Reading List

Source URL: www.intel.com

Language: English - Date: 2014-03-01 18:42:02
104Technology / Trusted computing / Telemetry / Network architecture / Trusted Network Connect / IF-MAP / SCADA / Control system security / Trusted Computing Group / Computer security / Computer network security / Computing

ARCHITECT’S GUIDE: ICS SECURITY USING TNC TECHNOLOGY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2013-11-06 16:49:30
105Computer network security / Internet Protocol / IPv6 / Trusted computing base / Computer network / Virtual private network / Kernel / Capability-based security / Ring / Computer security / Security / Computing

An Overview of the Annex System D.A. Grove T.C. Murray C.A. Owen C.J. North J.A. Jones M.R. Beaumont

Add to Reading List

Source URL: www.acsac.org

Language: English - Date: 2007-12-17 22:49:19
106X86 architecture / IBM PC compatibles / Hardware virtualization / X86 virtualization / IOMMU / Trusted Execution Technology / DMA attack / MOV / Southbridge / System software / Computer hardware / Computing

Another Way to Circumvent Intel® Trusted Execution Technology Tricking SENTER into misconfiguring VT-d via SINIT bug exploitation Rafal Wojtczuk Joanna Rutkowska

Add to Reading List

Source URL: invisiblethingslab.com

Language: English - Date: 2009-12-21 13:05:46
107Trusted Computing / Maintenance fee / Business / Computer security / Trusted Computing Group / Law

Trusted Computing Group Membership Agreement MEMBERSHIP CLASSIFICATION: ANNUAL MEMBERSHIP FEE

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2014-11-12 13:55:04
108Evaluation / Trusted computing base / Microkernel / L4 microkernel family / Real-time operating systems / Gernot Heiser / Formal verification / Isabelle / Formal methods / Computer security / Computer architecture / Computing

Mathematically Verified Software Kernels: Raising the Bar for High Assurance Implementations Dr Daniel Potts, VP of Engineering, General Dynamics C4 Systems Rene Bourquin, Member Technical Staff, General Dynamics C4 Syst

Add to Reading List

Source URL: sel4.systems

Language: English - Date: 2014-07-28 22:03:39
109Computing / Crime prevention / National security / Computer network security / Secure communication / Ring / Operating system / Trusted computing base / Hardware architect / Computer security / Security / Central processing unit

Naval Research Laboratory Washington, DC 20375*5000 NRL ReportA Framework for Evaluating Computer Architectures to

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:23
110Crime prevention / National security / Trusted Computer System Evaluation Criteria / Trusted computing base / Vulnerability / Information security / Trusted system / Common Criteria / Software security assurance / Computer security / Security / Data security

TOWARD A COMPREHENSIVE INFOSEC CERTIFICATION METHODOLOGY  Charles N. Payne, Judith N. Froscher and Carl E. Landwehr Center for High Assurance Computing Systems Naval Research Laboratory Washington, D.C–5337

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:26
UPDATE