Trusted Computing

Results: 881



#Item
331Management / Actuarial science / Data security / Risk management / Trustworthy computing / Information security / Enterprise risk management / Risk assessment / Risk analysis / Security / Computer security / Risk

Microsoft Word - Toward_a_Trusted_Supply_Chain-March-2014-DB-Edits .docx

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2014-04-28 20:19:01
332Security / Law / Business law / Cryptography / Trusted Computing / Digital rights management / Ring / Security policy / Virtual private network / Computer security / Computer network security / Copyright law

Managing Multiple Perspectives on Trust Clifford Neuman Director, USC Center for Computer Systems Security

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2009-01-21 12:12:04
333Tape drive / Computing / File system / Error detection and correction / Magnetic tape data storage / Bacula / Backup / Data security / Backup software

Reliable Verification vs. Tape Drive Read After Write and Hardware ECC At TOLIS Group, we strongly believe that verified backups are the only backups that can be trusted when disaster strikes and data needs to be restor

Add to Reading List

Source URL: www.tolisgroup.com

Language: English - Date: 2015-03-17 15:06:15
334Real-time operating systems / Trusted computing base / Embedded operating systems / Microkernel / L4 microkernel family / Evaluation / Multiple Independent Levels of Security / Multilevel security / Kernel / Computer architecture / Computer security / Computing

Trustworthy Embedded Systems http://www.ertos.nicta.com.au/ Trustworthy Embedded Systems ERTOS-2 Project Plan 2009–2013 [removed]

Add to Reading List

Source URL: ssrg.nicta.com.au

Language: English - Date: 2013-10-20 22:09:39
335Electronic commerce / Internet protocols / Internet standards / Secure communication / Public-key cryptography / McAfee / Firefox / Transport Layer Security / Network Security Services / Software / Computing / Cryptography

Solution Brief Counterattacking BERserk Restoring the “trust” in trusted connectivity.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 18:25:15
336Federated identity / OpenID / Computing

Don Thibeau Chairman & President There is no registry for trusted identity systems.

Add to Reading List

Source URL: oixnet.org

Language: English - Date: 2015-02-01 18:07:49
337Identity / Computer security / Federated identity / OpenID / National Strategy for Trusted Identities in Cyberspace / Phorm / Identity Commons / Kerberos / Online identity / Computing / Computer network security / Internet privacy

OVERVIEW & UPDATE   CROWDED & NOISY LANDSCAPE ISO WC3

Add to Reading List

Source URL: www.openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
338Electronic commerce / Internet protocols / Internet standards / Secure communication / Public-key cryptography / McAfee / Firefox / Transport Layer Security / Network Security Services / Software / Computing / Cryptography

Solution Brief Counterattacking BERserk Restoring the “trust” in trusted connectivity.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 18:25:15
339Zebra Technologies / FIPS 140-2 / Nvidia Ion / Trusted computing / Security / Cryptography / Cryptography standards / Computer security / Radio-frequency identification

Microsoft Word - 213e - SecurityPolicy WM-CE.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-02-10 11:56:21
340Security / FIPS 140 / Critical Security Parameter / Trusted Computing Group / Trusted Computing / Zeroisation / Authentication / SAS / Hitachi Global Storage Technologies / Cryptography / Computer security / Cryptography standards

Microsoft Word - 9k - Security Policy CBF.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-04 14:10:38
UPDATE