Trusted Computing

Results: 881



#Item
471Copyright law / Cryptography / Trusted Computing / Public safety / Emergency management / Trusted path / Trusted system / Safety / IBM Tivoli Storage Manager / Security / Computer security / Business law

Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture Timothy E. Levin1 , Jeffrey S. Dwoskin2 , Ganesha Bhaskara3 Thuy D. Nguyen1 , Paul C. Clark1 , Ruby B. Lee2 Cynthia

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2009-06-04 09:26:02
472Remote desktop / Trusted computing / Trusted Platform Module / X Window System / Trusted Execution Technology / Google Chrome OS / Thin client / Desktop virtualization / Hyper-V / Software / System software / Computing

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems Lorenzo Martignoni,∗ Pongsin Poosankam,∗† Matei Zaharia,∗ Jun Han,† Stephen McCamant,∗ Dawn Song,∗ Vern Paxson,∗ Adrian Perri

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-12-31 23:51:31
473Unix / X Window System / Software / System software / Computing / Consortia / POSIX / The Open Group

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity - Comments from The Open Group Staff on the Cybersecurity Framework Roadmap To Whom It May Concern: The Open Group Trusted Technology

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-10 21:19:31
474Computing / Privacy policy / Information privacy / Internet privacy / International Safe Harbor Privacy Principles / Information security / Personally identifiable information / Gramm–Leach–Bliley Act / Safe harbor / Privacy / Ethics / Law

PRIVACY AND TRANSPARENCY AT INCYTE Incyte honors its trusted relationships with healthcare professionals, patients, caregivers, consumers, employees and the partners with whom we work by offering transparency into the ma

Add to Reading List

Source URL: www.incyte.com

Language: English - Date: 2014-09-17 14:26:52
475Unified Extensible Firmware Interface / Computer architecture / Computer hardware / Vmlinux / Trusted computing / Linux / BIOS / Booting / System software

Extending secure boot to user space with Linux Integrity Subsystem Dmitry Kasatkin Integrity subsystem developer/co-maintainer [removed] Samsung Open Source Group

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2014-10-09 09:12:19
476Computer network security / Embedded system / Ring / Operating system / Internet of Things / Integrity / Wireless security / Trusted Platform Module / Secure communication / Computer security / Computing / Security

Embedded Security for Internet of Things Arijit Ukil Jaydip Sen Sripad Koilakonda

Add to Reading List

Source URL: iotsecuritylab.com

Language: English - Date: 2014-08-14 00:16:23
477Security / Information technology management / Software asset management / Trusted Network Connect / Network Access Control / Trusted Computing / Vulnerability / ISO/IEC 19770 / Computer security / Computer network security / Cyberwarfare

BUILDING BLOCK SOFTWARE ASSET MANAGEMENT Continuous Monitoring

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2014-06-19 14:23:27
478Internet standards / FTP / Internet protocols / FTPS / File Transfer Protocol / Secure copy / Secure Shell / Server / Sysax Multi Server / Computing / Internet / Network architecture

Trusted choice Features demanded by today’s businesses Security for the most sensitive data

Add to Reading List

Source URL: www.ipswitchft.com

Language: English - Date: 2014-05-15 10:48:39
479Cryptographic software / Trusted computing / BitLocker Drive Encryption / Windows 7 / Windows Server / Software / Provisioning / Trusted Platform Module / Trusted Computing Group / Computer security / Microsoft Windows / Disk encryption

Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing

Add to Reading List

Source URL: www.fbcinc.com

Language: English - Date: 2014-02-04 12:36:02
480X86 architecture / Out-of-band management / Intel vPro / Trusted computing / Intel Active Management Technology / Intel / Trusted Execution Technology / X86 virtualization / AES instruction set / Computing / System software / Computer architecture

September[removed]Real-World Guide Enterprise Mobile Security: 4th Generation Intel® Core™

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2014-11-11 19:10:30
UPDATE