Trusted Computing

Results: 881



#Item
11Computing / Security / Cyberwarfare / Computer security / Crime prevention / Cryptography / Information governance / National security / Application security / Cross-site request forgery / Software development kit / Vulnerability

#1 GLOBAL PAYMENTS COMPANY OPTIMIZES SECURE DEVELOPMENT PROCESS WITH PREVOTY Trusted payments provider with deeply embedded secure development culture partners with Prevoty for standardized, real-time application protect

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-18 22:09:36
12Computer security / System software / Software / Trusted computing base / Mandatory access control / Security-Enhanced Linux / Kernel / Policy Monitoring / System call / XTS-400

The Case for Abstracting Security Policies   

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-04-13 14:58:02
13Computer security / Cryptography / Computing / Security / Trusted Platform Module / Data in use / Embedded system / Physical unclonable function / Trusted Computing / Software / Operating system / Key management

Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan Developers seek to seamlessly integrate cyber

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 15:07:52
14Computing / Cloud computing / Cloud infrastructure / HP Cloud / VCloud Air / Converged infrastructure / Recovery as a service / Virtualization / IBM cloud computing / FUJITSU Cloud IaaS Trusted Public S5

White paper IaaS: Performance Upgrade.. How this cloud resource can boost IT infrastructure services enterprisewide, and support Big Data and disaster recovery projects

Add to Reading List

Source URL: webobjects.cdw.com

Language: English - Date: 2013-12-03 17:28:13
15Smart cards / Computing / Security / Ubiquitous computing / Computer access control / ISO standards / HID Global / MIFARE / Card reader / Java Card OpenPlatform / Java Card / Access control

LOGICAL AND PHYSICAL ACCESS SOLUTIONS Crescendo® C1150 ƒƒ Higher security – Encryption and data signing protects data-at-rest and enables trusted secure communications. ƒƒ Supports Secure Identity Object™ (SIO)

Add to Reading List

Source URL: planc.biz

Language: English - Date: 2013-12-17 10:12:36
16Information technology / Computing / Information / Data quality / Machine learning / Pharmaceutical industry / Validity / Information technology management / Data validation / Test set / Validation / Business process management

DATA VALIDATION ENSURE THE INTEGRITY OF YOUR IP DATA Accurate, complete, trusted IP data. That’s the power of

Add to Reading List

Source URL: thomsonipmanagement.com

Language: English - Date: 2015-08-07 13:07:20
17Software / Computing / Smartphones / Java / Archive formats / Alphabet Inc. / Android / App store / Type system / Apache Ant / Java annotation / JAR

SPARTA! Static Program Analysis for Reliable Trusted Apps http://types.cs.washington.edu/sparta/ VersionFebruary 2016) Contents

Add to Reading List

Source URL: types.cs.washington.edu

Language: English - Date: 2016-02-03 15:21:41
18Computing / Computer security / Computer networking / Trusted computing / Computer network security / Cyberwarfare / Data security / Firewall / Trusted Execution Technology / Network address translation / Trusted Platform Module / Packet processing

ETTM: A Scalable Fault Tolerant Network Manager Colin Dixon Hardeep Uppal Vjekoslav Brajkovic Dane Brandon Thomas Anderson Arvind Krishnamurthy University of Washington Abstract In this paper, we design, implement, and e

Add to Reading List

Source URL: colindixon.com

Language: English - Date: 2012-04-28 16:29:27
19System software / Computing / Software / Hypervisor / Trusted Computing / Protection ring / Hardware virtualization / Operating system / Virtualization / Malware / Embedded hypervisor / Qubes OS

Microsoft Word - Weber_Weber_Virtualisation_English

Add to Reading List

Source URL: www.itas.kit.edu

Language: English - Date: 2013-09-06 09:56:55
20Computing / Software engineering / Computer security / Cryptography / Trusted computing / Smart cards / Trusted Platform Module / Closure / Variable / Java Card / Subroutine / Trusted Execution Technology

The Trusted Execution Module: Commodity General-Purpose Trusted Computing Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, and Srinivas Devadas MIT Computer Science and Artificial Intelligence Laboratory, Cambridge,

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2008-06-16 20:15:44
UPDATE