Trusted Computing

Results: 881



#Item
401Trusted computing / Identity management / Cryptography / Procfs / Unix / Next-Generation Secure Computing Base / Kernel / Nexus / Trusted Platform Module / Computer architecture / Software / System software

Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2011-09-24 15:57:36
402National security / Access control / Computer network security / Trusted computing base / Password / Information security / Authentication / User / Authorization / Security / Computer security / Crime prevention

Microsoft Word - 31-Paper-Security in the real world.doc

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2004-04-30 02:34:25
403Law / Crime prevention / National security / Politics / Security policy / Digital rights management / Policy / Computer security / Trusted Computing / Copyright law / Computer network security / Security

Inside Risks Fred B. Schneider PAUL WATSON Secure Systems Conundrum B

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-08-26 11:04:06
404X86 architecture / Assembly languages / Models of computation / X86 assembly language / Trusted computing base / Memory protection / X86 / GNU Compiler Collection / State / Software / Computing / Programming language implementation

SASI Enforcement of Security Policies: A Retrospective∗ ´ Ulfar Erlingsson Fred B. Schneider

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 20:34:42
405Computing / Access control / Kernel / Access control list / Principle of least privilege / Trusted computing base / Linux kernel / File system API / File system / Software / Computer security / Security

Costs of Security in the PFS File System∗ Kevin Walsh Department of Mathematics and Computer Science College of the Holy Cross [removed] Fred B. Schneider

Add to Reading List

Source URL: ecommons.library.cornell.edu

Language: English - Date: 2012-07-26 01:01:29
406Trusted computing / Business law / Copyright law / Cryptography / Computing / Malware / Trusted Platform Module / Vulnerability / Computer / Computer security / Security / Cyberwarfare

From the Editors Trusted Computing in Context M

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2007-05-09 19:34:30
407IBM cloud computing / IICCRD / Cloud computing / Centralized computing / Cloud infrastructure

d0513_Trusted-E-Cloud-SEC[removed]indd

Add to Reading List

Source URL: www.federalnewsradio.com

Language: English - Date: 2014-07-14 18:37:41
408Trusted computing base / Principal / Authorization / Authentication / Security / Computer security / Computer network security

Authentication in Distributed Systems: Theory and Practice BUTLER LAMPSON, MARTÍN ABADI, MICHAEL BURROWS, and EDWARD WOBBER Digital Equipment Corporation

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 1996-05-11 01:53:14
409Trusted computing / Disk encryption / Trusted Platform Module / Hewlett-Packard / Cold boot attack / Public-key cryptography / Virtualization / Performance measurement / Cryptography / Computer security / Computing

The CloudProxy Tao for Trusted Computing John Manferdelli Tom Roeder Fred Schneider

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-10 19:44:59
410Crime prevention / Computer security / Computer network security / Trusted computing base / Password / Information security / Multilevel security / Physical security / Vulnerability / Security / Public safety / National security

Microsoft Word - Lampson - Security paper for IEEE Computer.doc

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2004-03-01 01:00:42
UPDATE