Trusted Computing

Results: 881



#Item
461Internet / Electronics / Email / Computing / Electronic mailing list

Custom Email Program Deliver your message to Elsevier’s readership As one of the most trusted names in medical publishing, Elsevier’s readers include some of the top practicing healthcare professionals in the industr

Add to Reading List

Source URL: www.elsmediakits.com

Language: English - Date: 2014-11-01 08:07:16
462Internet / Electronics / Email / Computing / Electronic mailing list

Custom Email Program Deliver your message to Elsevier’s readership As one of the most trusted names in medical publishing, Elsevier’s readers include some of the top practicing healthcare professionals in the industr

Add to Reading List

Source URL: www.elsmediakits.com

Language: English - Date: 2014-11-01 07:55:14
463Trusted computing / Security / Rainbow Series / Multilevel security / Mandatory access control / Evaluation / Trusted system / Discretionary access control / Reference monitor / Computer security / National Security Agency / Trusted Computer System Evaluation Criteria

A Guide to Understanding Security Modeling in Trusted Systems

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-05-07 00:20:20
464Hardware-based full disk encryption / Cryptography standards / Hard disk drive / Serial ATA / Serial attached SCSI / FIPS 140 / SCSI / Block cipher modes of operation / Trusted Computing Group / Computer hardware / Computing / Disk encryption

Microsoft Word - Seagate TCG Enterprise SSC SED - FIPS 140 Module Security Policy.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-09 11:08:06
465Electronic commerce / Internet protocols / Internet standards / Secure communication / Public-key cryptography / McAfee / Firefox / Transport Layer Security / Network Security Services / Software / Computing / Cryptography

Solution Brief Counterattacking BERserk Restoring the “trust” in trusted connectivity.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 18:25:15
466Trademark law / National Strategy for Trusted Identities in Cyberspace / Privacy policy / Accreditation / TRUSTe / Professional certification / Computing / Ethics / Standards / Evaluation / Certification mark

TRUSTMARKS IN THE IDENTITY ECOSYSTEM Definitions, Use, and Governance  

Add to Reading List

Source URL: oixuk.org

Language: English - Date: 2014-09-16 07:10:42
467National security / Computer crimes / Computer network security / Secure communication / Howard Schmidt / Trustworthy computing / International Multilateral Partnership Against Cyber Threats / Trusted computing base / Comprehensive National Cybersecurity Initiative / Cyberwarfare / Security / Computer security

C OV ER F E AT U RE MOVING TOWARD TRUSTWORTHY SYSTEMS: R&D ESSENTIALS

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-12-19 11:35:47
468Computing / Search algorithms / Information / Data / Hash tree / Hash function / Hash list / Trie / Database index / Error detection and correction / Hashing / Cryptographic hash functions

TRUSTED ARCHIVE OVERVIEW ARCHIVE RECONCILIATION AT MASSIVE SCALE USING MERKEL TREES

Add to Reading List

Source URL: www.bloomberg.com

Language: English - Date: 2014-12-23 13:21:52
469Performance management / Computing / Alert messaging / New Relic / Technology / Computer performance / Apdex / Management

Apdex: A Trusted Approach to User Experience Alerting Apdex is an industry standard to measure users’ satisfaction with the response time of an application or service. It’s a simplified service-level agreement (SLA)

Add to Reading List

Source URL: try.newrelic.com

Language: English - Date: 2014-12-17 19:55:08
470Computing / USB flash drive / Data security / Universal Serial Bus / USB mass-storage device class / IronKey / Trusted Computing Group / Trusted Platform Module / BIOS / Computer hardware / USB / Computer security

TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems Bo Yang, Dengguo Feng, Yu Qin, Yingjun Zhang, and Weijin Wang Trusted Computing and Information Assurance Laboratory Institute of Sof

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-11 21:51:08
UPDATE