Trusted Computing

Results: 881



#Item
221Trusted Platform Module / Trusted Computing Group / Disk encryption / Unified Extensible Firmware Interface / Two-factor authentication / X.509 / Trusted Execution Technology / BitLocker Drive Encryption / Computer security / Cryptography / Trusted computing

TRUSTED TAMPERPROOF TIME ON MOBILE DEVICES Trusted Tamperproof Time on Mobile Devices Using TPM 2.0 Services with Remote Attestation August 2, 2013

Add to Reading List

Source URL: www.jwsecure.com

Language: English - Date: 2014-12-16 20:21:45
222Electric power distribution / Electric power transmission systems / Emerging technologies / Smart grid / Smart meter / Electricity meter / Internet privacy / Demand response / Privacy / Electric power / Energy / Technology

Privacy-Enhanced Bi-Directional Communication in the Smart Grid using Trusted Computing Andrew Paverd Andrew Martin

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2015-03-18 10:54:17
223Internet privacy / Technology / Information privacy / TRUSTe / Identity theft / Hewlett-Packard / Ethics / Computing / Privacy

2010 Most Trusted Companies for Privacy: U.S. Consumers Executive Summary Independently conducted by Ponemon Institute LLC Publication Date: February 28, 2010

Add to Reading List

Source URL: www.ponemon.org

Language: English - Date: 2010-05-25 15:25:34
224Data types / Type theory / Association for Computing Machinery / Programming Language Design and Implementation / Trusted computing base / Programming language / Java / Memory safety / ALGOL 68 / Computing / Software engineering / Programming language theory

Computer security  PLDI’06 Tutorial T1: Enforcing and Expressing Security with Programming Languages

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2006-06-11 03:17:49
225Gernot Heiser / L4 microkernel family / Formal verification / Real-time operating systems / Kernel / Computer security / Integrity / Mach / Ring / Computer architecture / Trusted computing base / Microkernel

seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

Add to Reading List

Source URL: sel4.org

Language: English - Date: 2014-09-23 22:58:53
226Business law / Copyright law / Direct Anonymous Attestation / Trusted Platform Module / Kerberos / Ticket Granting Ticket / Trusted Execution Technology / Computer security / Cryptography / Trusted computing

Implementation of a Trusted Ticket System Andreas Leicher1 , Nicolai Kuntze2 , and Andreas U. Schmidt3 1 Johann Wolfgang Goethe-Universität, Frankfurt am Main,Germany,

Add to Reading List

Source URL: andreas.schmidt.novalyst.de

Language: English - Date: 2009-01-06 04:23:23
227Electronics / Trusted Platform Module / Trusted Computing Group / Mobile telecommunications / Wireless / Mobile phone / Bluetooth / Next-Generation Secure Computing Base / Trusted Execution Technology / Technology / Computer security / Trusted computing

TECHNOLOGY NEWS Will Proposed Standard Make Mobile Phones More Secure?

Add to Reading List

Source URL: leavcom.com

Language: English - Date: 2013-04-12 14:46:43
228National security / Computer network security / Electronic commerce / Secure communication / Multilevel security / Trusted computing base / Operating system / Kernel / Ring / Computer security / Security / Crime prevention

A Model of Security for Distributed Systems August 28, 1995 4:06 pm A New Model of Security for Distributed Systems Wm A. Wulf

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 1998-12-07 09:06:04
229Crime prevention / National security / Internet in the United States / Government / Electronic commerce / Trusted Internet Connection / Federal Information Security Management Act / Cloud computing / Information security / Security / Computer security / Public safety

The FedRAMP-TIC Overlay Overview The Department of Homeland Security (DHS), in collaboration with the Federal Risk Authorization Management Program (FedRAMP) Program Management Office (PMO), has developed a DRAFT overla

Add to Reading List

Source URL: www.fedramp.gov

Language: English - Date: 2015-04-01 13:52:27
230Computer network security / Trusted computing / Data transmission / IF-MAP / Attack / Vulnerability / Burglar alarm / Computer security / Security / Cyberwarfare

TNC-SCAP Use Cases Paul Bartock Vulnerability Analysis & Operations Group Information Assurance Directorate National Security Agency 24 March 2011

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:32:04
UPDATE