Trusted Computing

Results: 881



#Item
31figures/spendorsementRATE.eps

figures/spendorsementRATE.eps

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
32#1 GLOBAL PAYMENTS COMPANY OPTIMIZES SECURE DEVELOPMENT PROCESS WITH PREVOTY Trusted payments provider with deeply embedded secure development culture partners with Prevoty for standardized, real-time application protect

#1 GLOBAL PAYMENTS COMPANY OPTIMIZES SECURE DEVELOPMENT PROCESS WITH PREVOTY Trusted payments provider with deeply embedded secure development culture partners with Prevoty for standardized, real-time application protect

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
33cTPM: A Cloud TPM for Cross-Device Trusted Applications Chen Chen† , Himanshu Raj, Stefan Saroiu, and Alec Wolman Microsoft Research and † CMU Current Trusted Platform Modules (TPMs) are illsuited for use in mobile s

cTPM: A Cloud TPM for Cross-Device Trusted Applications Chen Chen† , Himanshu Raj, Stefan Saroiu, and Alec Wolman Microsoft Research and † CMU Current Trusted Platform Modules (TPMs) are illsuited for use in mobile s

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:12
34Acceptance of CMAS IaaS & PaaS

Acceptance of CMAS IaaS & PaaS

Add to Reading List

Source URL: www.dgs.ca.gov

Language: English - Date: 2016-05-17 14:43:59
35SOLUTION OVERVIEW Talari Networks, the trusted SD-WAN technology and market leader, is engineering the internet and branch for maximum business impact by delivering two solutions - a Failsafe Software Defined WAN (SD-WAN

SOLUTION OVERVIEW Talari Networks, the trusted SD-WAN technology and market leader, is engineering the internet and branch for maximum business impact by delivering two solutions - a Failsafe Software Defined WAN (SD-WAN

Add to Reading List

Source URL: www.talari.com

Language: English - Date: 2016-07-22 16:58:14
36hardware security module (HSM) geotag platform trust policy hardened virtual server image  Trusted Platform BIOS

hardware security module (HSM) geotag platform trust policy hardened virtual server image Trusted Platform BIOS

Add to Reading List

Source URL: cloudschool.com

Language: English - Date: 2016-06-06 17:05:59
37Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
38IBM Research  Policy Enforcement and Compliance Proofs for Xen Virtual Machines Bernhard Jansen (IBM Zurich Research Laboratory) HariGovind Ramasamy (IBM T. J. Watson Research Center)

IBM Research Policy Enforcement and Compliance Proofs for Xen Virtual Machines Bernhard Jansen (IBM Zurich Research Laboratory) HariGovind Ramasamy (IBM T. J. Watson Research Center)

Add to Reading List

Source URL: vee08.cs.tcd.ie

Language: English - Date: 2008-03-14 08:22:47
39ITL Bulletin, Implementing Trusted Geolocation Services in the Cloud, (February 2016)

ITL Bulletin, Implementing Trusted Geolocation Services in the Cloud, (February 2016)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-02-17 09:34:37
40Trusted Domain Project Intellectual Property Policy Ratified by the Board of Directors on November 7, 2011 I. INTRODUCTION The Trusted Domain Project (hereinafter “TDP”) is a public interest non-profit California cor

Trusted Domain Project Intellectual Property Policy Ratified by the Board of Directors on November 7, 2011 I. INTRODUCTION The Trusted Domain Project (hereinafter “TDP”) is a public interest non-profit California cor

Add to Reading List

Source URL: www.trusteddomain.org

Language: English - Date: 2013-02-18 03:40:17