Trusted Computing

Results: 881



#Item
351Theoretical computer science / Formal methods / L4 microkernel family / Microkernel / Formal verification / Isabelle / Trusted computing base / Gernot Heiser / Kernel / Computer architecture / Software / Computing

seL4: Formal Verification of an OS Kernel Gerwin Klein1,2 , Kevin Elphinstone1,2 , Gernot Heiser1,2,3 June Andronick1,2 , David Cock1 , Philip Derrin1∗, Dhammika Elkaduwe1,2‡, Kai Engelhardt1,2 Rafal Kolanski1,2 , Mi

Add to Reading List

Source URL: www.ok-labs.com

Language: English - Date: 2010-10-07 14:23:07
352HTTP Secure / Computing / Computer virus / Software / Windows XP / System software / Windows Firewall

I can’t access some Web Sites/my.csu Making CSU a ‘Trusted’ site A trusted site is a site which you believe will not cause damage to your computer, ie: will not contain any viruses or harmful files •

Add to Reading List

Source URL: www.csu.edu.au

Language: English - Date: 2011-03-17 19:34:57
353TRUSTe / Computing / Technology / Internet privacy / EAuthentication / Cloud computing

AU2EU demonstrates in a real-life environment an integrated eAuthentication and eAuthorisation framework to enable trusted collaborations and delivery of services across different organizational/governmental jurisdiction

Add to Reading List

Source URL: www.au2eu.eu

Language: English - Date: 2014-05-01 03:34:07
354Computing / Internet / Google / Human–computer interaction / World Wide Web

• The definitive home for business intelligence on the web, AB.com provides the regional business community with trusted news, analysis and opinion, delivering breaking stories around the

Add to Reading List

Source URL: www.arabianbusiness.com

Language: English - Date: 2015-02-05 04:13:34
355Network architecture / Network virtualization / Internet security / Virtual private network / Computer network / Virtual network / Virtualization / Client–server model / Cloud computing / Computing / Computer network security / System software

Trusted Networks are Everything Disclaimer This presentation has been prepared for the consideration of potential investors by iWebGate Technology Limited (“the Company”) and does not carry any right of publication

Add to Reading List

Source URL: iwebgate.com

Language: English - Date: 2015-03-08 19:41:24
356Network architecture / Network virtualization / Internet security / Virtual private network / Computer network / Virtual network / Virtualization / Client–server model / Cloud computing / Computing / Computer network security / System software

Trusted Networks are Everything Disclaimer This presentation has been prepared for the consideration of potential investors by iWebGate Technology Limited (“the Company”) and does not carry any right of publication

Add to Reading List

Source URL: www.iwebgate.com

Language: English - Date: 2015-03-08 19:41:24
357Microkernel / Trusted computing base / L4 microkernel family / Monolithic kernels / Virtual machines / Gernot Heiser / Kernel / Embedded system / Linux kernel / Computer architecture / System software / Software

Secure Embedded Systems Need Microkernels Gernot Heiser National ICT Australia∗ and University of New South Wales Sydney, Australia

Add to Reading List

Source URL: www.ok-labs.com

Language: English - Date: 2010-10-07 14:23:41
358Evaluation / Trusted computing base / Microkernel / L4 microkernel family / Real-time operating systems / Gernot Heiser / Formal verification / Isabelle / Formal methods / Computer security / Computer architecture / Computing

Mathematically Verified Software Kernels: Raising the Bar for High Assurance Implementations Dr Daniel Potts, VP of Engineering, General Dynamics C4 Systems Rene Bourquin, Member Technical Staff, General Dynamics C4 Syst

Add to Reading List

Source URL: sel4.systems

Language: English - Date: 2014-07-28 22:03:39
359Gernot Heiser / L4 microkernel family / Formal verification / Real-time operating systems / Kernel / Computer security / Integrity / Mach / Ring / Computer architecture / Trusted computing base / Microkernel

seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

Add to Reading List

Source URL: sel4.systems

Language: English - Date: 2014-09-23 22:58:53
360Evaluation / Formal methods / Microkernel / L4 microkernel family / Trusted computing base / Gernot Heiser / Formal verification / Kernel / Evaluation Assurance Level / Computer architecture / System software / Computing

Your System is Secure? Prove it! Gernot Heiser NICTA∗ and University of New South Wales and Open Kernel Labs Sydney, Australia [removed]

Add to Reading List

Source URL: www.ok-labs.com

Language: English - Date: 2010-10-07 14:22:41
UPDATE