Trusted Computing

Results: 881



#Item
341Electronic commerce / Internet protocols / Internet standards / Secure communication / Public-key cryptography / McAfee / Firefox / Transport Layer Security / Network Security Services / Software / Computing / Cryptography

Solution Brief Counterattacking BERserk Restoring the “trust” in trusted connectivity.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 18:25:15
342Information / Internet standards / Network management / System administration / Multi-agent systems / Simple Network Management Protocol / Security service / Digest access authentication / Communications protocol / Computing / Data / Internet protocols

Network Working Group Request for Comments: 1352 J. Galvin Trusted Information Systems, Inc. K. McCloghrie

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-03-27 15:09:16
343Trusted computing / Security / Rainbow Series / Multilevel security / Mandatory access control / Evaluation / Trusted system / Discretionary access control / Reference monitor / Computer security / National Security Agency / Trusted Computer System Evaluation Criteria

A Guide to Understanding Security Modeling in Trusted Systems

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-07 00:20:20
344Paul Vixie / Year of birth missing / Domain name system / Internet Systems Consortium / Carl Malamud / Rebecca Hargrave Malamud / ISC license / ICANN / .net / Internet / Computing / Technology

 _TOP_  _THE_.ORG_TLD_IS_A_PUBLIC_TRUST_  _»_  « A Joint Effort of the _INTERNET_MULTICASTING_SERVICE_ and _INTERNET_SOFTWARE_CONSORTIUM_ »

Add to Reading List

Source URL: trusted.resource.org

Language: English - Date: 2002-06-17 11:56:29
345National Security Agency / Trusted computing base / Mandatory access control / System call / Security-Enhanced Linux / Kernel / JavaScript / XTS-400 / Computer security / Computing / Software

The Case for Abstracting Security Policies   

Add to Reading List

Source URL: anil.recoil.org

Language: English
346Digital Millennium Copyright Act / Trusted Computing / Ink cartridge / Anti-circumvention / Electronic Arts / OMA DRM / Extended Copy Protection / Copyright law / Law / Digital rights management

FIPR’s Consultation Response on DRM The Foundation for Information Policy Research is an independent body that studies the interaction between information technology and society. Its goal is to identify technical devel

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-01-11 06:12:47
347Computer security / Malware / Rootkit / Ring / Virtual machine / Hypervisor / Unified Extensible Firmware Interface / Operating system / Trusted Execution Technology / System software / Computing / Software

real-time passive volatile memory inspection inside virtual machines CanSecWest. march

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2015-03-27 04:18:18
348Trusted computing / Virtual machines / Trusted Execution Technology / x86 architecture / Intel / Trusted Platform Module / X86 virtualization / Ring / Xeon / System software / Computer security / Computing

Intel® Trusted Execution Technology (Intel® TXT) Enabling Guide Version 1 March, 2014 The purpose of this management enabling guide is to provide you with a better understanding of how

Add to Reading List

Source URL: www.intel.de

Language: English - Date: 2014-04-25 14:45:13
349Trusted computing / Next-Generation Secure Computing Base / Trusted computing base / Trusted Platform Module / Microkernel / Trustworthy computing / Kernel / Ring / Virtual machine / Computer security / Computing / Security

Nexus: A New Operating System for Trustworthy Computing Alan Shieh Dan Williams

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-11-01 01:44:44
350Document management systems / Oracle Corporation / Workflow / Oracle Database / Content storage management / Digital asset / Information technology management / Software / Computing

ORACLE DAT A SHEET DIVArchive The leading and most trusted digital asset content storage management system, Oracle’s Front Porch Digital DIVArchive revolutionizes digital

Add to Reading List

Source URL: www.fpdigital.com

Language: English - Date: 2015-04-09 16:39:25
UPDATE