Trusted Computing

Results: 881



#Item
261Internet standards / Data / Computer networks / AS2 / Electronic commerce / Secure communication / CAcert.org / Edigas / AS1 / Cryptography / Cryptographic protocols / Computing

Press release Natural gas industry accepts CAcert CAcert is now officially accepted by the Edig@s work group as a trusted Certificate Authority (CA) for Electronic Data Interchange (EDI). This acceptance provides the bas

Add to Reading List

Source URL: svn.cacert.org

Language: English - Date: 2013-07-11 15:14:30
262EMC Corporation / Carahsoft Technology Corp. / Enterprise software / Symantec / HP Software Division / VMware / Brightcove / Software industry / Red Hat / Computing / Business / Technology

SOLUTIONS FOR GOVERNMENT TM Carahsoft Technology Corp. is the trusted Government IT solutions provider, combining technological expertise with a thorough understanding of the government procurement process to help feder

Add to Reading List

Source URL: www.carahsoft.com

Language: English - Date: 2015-03-02 13:54:22
263Antivirus software / F-Secure / Smartphones / Computer network security / La Jolla / Nokia / Cloud computing / Internet privacy / Computer security / Computing / Technology / Economy of Finland

*For release on February 21, 2014, 9am CET * Jolla and F-Secure Join Forces to Offer younited, the Trusted Cloud Service to Jolla Users HELSINKI, Finland – February 21, 2014 – Jolla, the Finnish smartphone and Sailf

Add to Reading List

Source URL: cdn.jolla.com

Language: English - Date: 2014-07-20 16:22:07
264Computing / Email / Electronic health record / Health Insurance Portability and Accountability Act / Technology / Fax / Biscom

CUSTOMER SUCCESS STORY The Trusted Solution for Enterprise Secure File Transfer Massachusetts General Hospital Mass General Hospital Doubles Document-delivery Pace, Cuts

Add to Reading List

Source URL: www.biscom.com

Language: English - Date: 2013-11-27 14:54:15
265National security / Computer network security / Electronic commerce / Secure communication / Multilevel security / Trusted computing base / Operating system / Kernel / Ring / Computer security / Security / Crime prevention

A Model of Security for Distributed Systems August 28, 1995 4:06 pm A New Model of Security for Distributed Systems Wm A. Wulf

Add to Reading List

Source URL: legion.virginia.edu

Language: English - Date: 1998-12-07 09:06:04
266Aspect-oriented programming / Crime prevention / National security / Computer security / Aspect-oriented software development / Spring Framework / Information security / Vulnerability / InterTrust Technologies / Software development / Security / Computing

2nd issue of the INTER-TRUST Newsletter The INTER-TRUST mission is to answer to the needs of developers, integrators, operators and users and develop and interoperate systems in a secure trusted manner in today’s heter

Add to Reading List

Source URL: inter-trust.lcc.uma.es

Language: English - Date: 2014-04-01 03:12:26
267OSI protocols / Biscom / Fax / Con-way Truckload / File Transfer Protocol / Menlo Worldwide Logistics / Internet / Email / Computing

Transportation and Logistics Industry The Trusted Solution for Enterprise Secure File Transfer BISCOM DELIVERY SERVER Application Brief: Eliminate large email attachments

Add to Reading List

Source URL: www.biscom.com

Language: English - Date: 2013-11-27 14:56:37
268Graphic design / Graphics software / Abbreviations / Tagged Image File Format / Computer file formats / Credit card / Accounts payable / Advertising / JPEG / Software / Computing / Graphics file formats

MEDIA KIT CONNECTING COMPANIES & COMMUNITIES Reach your coveted demographic is this proven and trusted publication. No other publication reaches decision makers in Greater Western Sydney like WSBA. Discover why leading c

Add to Reading List

Source URL: www.accessnews.com.au

Language: English - Date: 2015-03-16 19:36:11
269MINIX / Trusted Computer System Evaluation Criteria / Rainbow Series / Trusted computing base / Operating system / Trusted system / Discretionary access control / Andrew S. Tanenbaum / Ring / Computer architecture / Computer security / Computing

Trusted MINIX: A Worked Example Albert L. Donaldson ESCOM Corporation[removed]Waples Mill Road Oakton, VA 22124

Add to Reading List

Source URL: www.escom.com

Language: English - Date: 2006-07-19 10:32:27
270Computer-mediated communication / Internet / Email encryption / Gmail / Jumbleme / Secure messaging / Internet privacy / Email / Computing

PCMag.com Names Enlocked Editors’ Choice for Encrypted Email Unmatched Security and Simplicity Cited in Product Review SAN JOSE, Calif. (August 18, 2014) – PCMag.com (www.pcmag.com), the most trusted online brand for

Add to Reading List

Source URL: www.enlocked.com

Language: English - Date: 2014-08-19 08:24:50
UPDATE