Trusted Computing

Results: 881



#Item
21Security Watch  Rebecca T. Mercuri Computer Security: Quality Rather than Quantity

Security Watch Rebecca T. Mercuri Computer Security: Quality Rather than Quantity

Add to Reading List

Source URL: www.notablesoftware.com

Language: English - Date: 2007-02-28 16:29:24
22æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
23Lenovo System x3650 M5 World-class performance and industry-leading reliability Lenovo Trusted Platform Assurance, a built-in set of security features and practices, protects the hardware and firmware. Also deploy self-e

Lenovo System x3650 M5 World-class performance and industry-leading reliability Lenovo Trusted Platform Assurance, a built-in set of security features and practices, protects the hardware and firmware. Also deploy self-e

Add to Reading List

Source URL: www.lenovo.com

Language: English - Date: 2016-04-01 11:16:15
24Experteer is Europe‘s premium career network reaching thousands of professionals who choose Experteer as their trusted source to access senior level positions. We aim to offer the most senior level career opportunities

Experteer is Europe‘s premium career network reaching thousands of professionals who choose Experteer as their trusted source to access senior level positions. We aim to offer the most senior level career opportunities

Add to Reading List

Source URL: experteer-downloads.s3.amazonaws.com

Language: English - Date: 2016-07-25 10:42:23
25COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:30
26Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i

Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2000-11-10 16:38:10
27Continuous Tamper-proof Logging Using TPM 2.0 Arunesh Sinha1 , Limin Jia1 , Paul England2 , and Jacob R. Lorch2 1  Carnegie Mellon University, Pittsburgh, Pennsylvania, USA

Continuous Tamper-proof Logging Using TPM 2.0 Arunesh Sinha1 , Limin Jia1 , Paul England2 , and Jacob R. Lorch2 1 Carnegie Mellon University, Pittsburgh, Pennsylvania, USA

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
28Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
29myPurdue Proxy Frequently Asked Questions Student Questions Q: What is a myPurdue proxy? A: Students can give parents, legal guardians, or other trusted parties access to view certain pieces of their student information

myPurdue Proxy Frequently Asked Questions Student Questions Q: What is a myPurdue proxy? A: Students can give parents, legal guardians, or other trusted parties access to view certain pieces of their student information

Add to Reading List

Source URL: www.purdue.edu

Language: English - Date: 2016-08-16 10:37:59
30Trusted Identities Cross Border A Look at Stork-Experiences From STORK to STORK 2.0 Architecture and Technical Aspects   Stork 2.0 is an EU co-funded project INFSO-ICT-PSP

Trusted Identities Cross Border A Look at Stork-Experiences From STORK to STORK 2.0 Architecture and Technical Aspects Stork 2.0 is an EU co-funded project INFSO-ICT-PSP

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2013-03-25 06:53:35