Trusted Computing

Results: 881



#Item
411L4 microkernel family / Microkernel / Gernot Heiser / Kernel / XNU / Darwin / Inter-process communication / Thread / Trusted computing base / Computer architecture / Mac OS X / Mach

University of New South Wales School of Computer Science and Engineering Performance Limits of Darwin on L4 Thesis Part B

Add to Reading List

Source URL: www.disy.cse.unsw.edu.au

Language: English - Date: 2008-06-03 01:23:50
412Trusted computing / X86 architecture / Cloud infrastructure / Disk encryption / AES instruction set / Trusted Execution Technology / OpenStack / Intel / Hypervisor / System software / Software / Computing

Open Source on Intel white paper OpenStack* Intel® Xeon® processors

Add to Reading List

Source URL: software.intel.com

Language: English - Date: 2013-12-05 13:47:51
413Public safety / Prevention / Computer network security / Computer security / Electronic commerce / Trusted computing base / Programming language / Security policy / Security engineering / Security / Crime prevention / National security

Mapping the Security Landscape: A Role for Language Techniques Abstract of Invited Lecture Fred B. Schneider Department of Computer Science Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2007-09-25 14:39:00
414Internet privacy / Networking hardware / Trusted computing / Internet protocols / Internet standards / Router / Network switch / Forwarding plane / Trusted Platform Module / Computing / Internet / Network architecture

NetQuery: A Knowledge Plane for Reasoning about Network Properties Alan Shieh Emin Gün Sirer

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2011-06-13 18:29:48
415Operating system / Linux / IBM / Power Architecture / Software / Server / IBM cloud computing / Trusted Computing Group / Computing / Server hardware / Computer architecture

Foundation Overview April 2014 Gilad Shainer HPC Advisory Council, Lugano Switzerland, April 2014 © OpenPOWER Foundation 2014

Add to Reading List

Source URL: www.hpcadvisorycouncil.com

Language: English - Date: 2014-12-18 21:33:31
416National security / Access control / Computer network security / Trusted computing base / Password / Information security / Authentication / User / Authorization / Security / Computer security / Crime prevention

Microsoft Word - 31-Paper-Security in the real world.doc

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2006-01-30 14:52:56
417Disk encryption / Cryptographic software / Windows Vista / Trusted computing / Windows Server / BitLocker Drive Encryption / Trusted Platform Module / Next-Generation Secure Computing Base / Encrypting File System / Microsoft Windows / System software / Software

Secure Startup–Full Volume Encryption: Technical Overview - 20

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2006-06-22 16:03:10
418Information theory / Principle of least privilege / Ring / Trusted computing base / Authorization / Operating system / Reference monitor / Privilege / Security / Computer security / Access control

Least Privilege and More1 Fred B. Schneider Department of Computer Science Cornell University Ithaca, New York 14853

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2003-07-02 11:18:02
419Computer-mediated communication / Spamming / Internet / DomainKeys Identified Mail / Salesforce.com / Email spam / Force.com / Email authentication / Anti-spam techniques / Email / Computing / Spam filtering

Trusted Message Delivery for Salesforce.com Overview With Trusted Message Delivery for Salesforce.com, we deploy one or more specially configured Sentrions either on your premises or in a hosted environment to route mail

Add to Reading List

Source URL: www.sendmail.com

Language: English - Date: 2010-04-21 19:52:08
420Cyberwarfare / Global Information Assurance Certification / Software testing / SANS Institute / Web application security / Programmer / Software engineering / Application security / Vulnerability / Computer security / Computing / Computer network security

SANS Institute was established in 1989 as a cooperative research and education organization. Today, SANS is the most trusted and largest source for information security training and certification in the world. SANS teach

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 18:45:04
UPDATE