Trusted Computing

Results: 881



#Item
381Trusted computing / Cryptography / Hashing / Monolithic kernels / Next-Generation Secure Computing Base / Trusted Platform Module / Procfs / Kernel / Hash table / Computer architecture / Computing / Computer security

Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

Add to Reading List

Source URL: sigops.org

Language: English - Date: 2011-09-20 03:37:00
382National security / Computer network security / Secure communication / Security policy / Reference monitor / Trusted computing base / Kernel / Protection mechanism / Vulnerability / Computer security / Security / Crime prevention

A Language-Based Approach to Security Fred B. Schneider1 , Greg Morrisett1 , and Robert Harper2 2 1 Cornell University, Ithaca, NY

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-13 15:41:39
383Sun Java System Directory Server / Solaris / Lightweight Directory Access Protocol / Oracle Database / Extension / Solaris Trusted Extensions / Software / Directory services / Computing

Trusted Extensions Configuration Guide Part No: 820–3508–15 April 2012 Copyright © 1994, 2012, Oracle and/or its affiliates. All rights reserved.

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2012-07-18 06:47:15
384Cisco Career Certifications / VMware / Data center / Professional certification / Cisco Systems / IBM cloud computing / HP ExpertONE / Computing / Cloud computing / Concurrent computing

ENABLE YOUR JOURNEY TO THE CLOUD Build your team of trusted advisors with Certified Cloud Architects (EMCCA) and Data Center Architects (EMCDCA)

Add to Reading List

Source URL: emc.memeconnect.com

Language: English - Date: 2011-10-11 13:14:13
385Trusted computing / Next-Generation Secure Computing Base / Trusted computing base / Trusted Platform Module / Microkernel / Trustworthy computing / Kernel / Ring / Virtual machine / Computer security / Computing / Security

Nexus: A New Operating System for Trustworthy Computing Alan Shieh Dan Williams

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-11-12 14:33:40
386Ajax / JSON / JavaScript / Scripting languages / RSpec / Recruitment / PostgreSQL / X Window System / Software / Computing / Cross-platform software

Experteer is Europe‘s premium career & recruitment network reaching 6 million professionals and executives who choose Experteer as their trusted source to access the high-end job market. We offer more than[removed]oppor

Add to Reading List

Source URL: www.experteer.ch

Language: English - Date: 2014-08-14 09:25:14
387Computer network security / Fred B. Schneider / Year of birth missing / Kernel / Trusted computing base / Linux kernel / Operating system / Protection mechanism / Policy / Computer security / Computing / Security

LNCS[removed]Lifting Reference Monitors from the Kernel

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-12 23:57:02
388Recruiter / Computing / Recruitment / World Wide Web / Google / Management / Employment / Pay per click search engines / AdWords

Experteer is Europe‘s premium career & recruitment network reaching 5 million professionals and executives who choose Experteer as their trusted source to access the high-end job market. We offer more than[removed]oppor

Add to Reading List

Source URL: www.experteer.ch

Language: English - Date: 2014-07-17 08:48:36
389JSON / Agile software development / PostgreSQL / Software / Computing / RSpec

Experteer is Europe‘s premium career & recruitment network reaching 6 million professionals and executives who choose Experteer as their trusted source to access the high-end job market. We offer more than[removed]oppor

Add to Reading List

Source URL: www.experteer.ch

Language: English - Date: 2014-08-14 09:24:56
390ProjectWise / Computing / Bentley Systems / Windows Server / Microsoft SQL Server / Software / Content management systems / Project management software

PRODUCT DATA SHEET Bentley Transmittal Services Secure, Trusted Transmittal Processes for ProjectWise® Bentley Transmittal Services provides a secure process tightly integrated with ProjectWise V8i (SELECTseries 4). Th

Add to Reading List

Source URL: ftp2.bentley.com

Language: English - Date: 2012-08-20 04:16:22
UPDATE