Trusted Computing

Results: 881



#Item
491Inspector General / Public safety / Computing / Regulatory compliance / Information security / Managed Trusted Internet Protocol Service / Security Content Automation Protocol / Computer security / Security / Federal Information Security Management Act

OIG 2014 Evaluation of the Farm Credit Administration’s Compliance with the Federal Information Security Management Act

Add to Reading List

Source URL: www.fca.gov

Language: English - Date: 2014-12-05 11:36:14
492Separation kernel / Principle of least privilege / Kernel / Ring / Linux kernel / Thread / Trusted computing base / Privilege separation / Privilege / Computer architecture / Computer security / Computing

Microsoft Word - C5_077_LEVIN.doc

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2009-03-04 17:16:50
493Cryptography / Business law / Copyright law / Trusted Platform Module / Trusted computing base / Ring / Vulnerability / Password / Trusted system / Computer security / Security / Trusted computing

Idea: Trusted Emergency Management Timothy E. Levin1 , Cynthia E. Irvine1 , Terry V. Benzel2 , Thuy D. Nguyen1 , Paul C. Clark1 , and Ganesha Bhaskara2 1 2

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2009-06-04 09:26:02
494National security / Evaluation / Computer network security / Trusted computing base / Multilevel security / National Information Assurance Partnership / Mandatory access control / Trusted Computer System Evaluation Criteria / Common Criteria / Computer security / Security / Crime prevention

Engineering Secure Systems Lessons Learned from Building a High-Assurance Crypto Gateway The construction of a complex secure system composed

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2012-10-30 13:53:03
495Computing / Cryptography / Disk encryption / Hardware-based full disk encryption / Trusted Computing Group / FIPS 140-2 / FIPS 140 / Parallel ATA / Trusted Computing / Computer hardware / Cryptography standards / Computer security

Microsoft Word - 9f - Seagate Secure® TCG Opal SSC SED FIPS[removed]Module Security Policy rev 1.4.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-08 10:58:40
496Tablet computer / Surveillance / High Assurance Internet Protocol Encryptor / National Security Agency / National security / Computing / Classes of computers / Personal computing

Trusted Tablet Battlefied Rugged Trusted Host Computer NSA Type 1 Certified, SECRET data in storage, and SECRET data in transit

Add to Reading List

Source URL: www.turtle-mtn.com

Language: English - Date: 2014-10-15 16:14:29
497Cyberwarfare / Trusted Computing / Cryptographic protocol / Operating system / Cryptographic hash function / Cryptography / Security / Computer security

Formal Modeling and Verification of CloudProxy Wei Yang Tan1 , Rohit Sinha1 , John L. Manferdelli2 , and Sanjit A. Seshia1 1 2

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2014-08-07 18:17:41
498Technology / Mobile device / Handheld game console / Computing / Mobile computers / Classes of computers / Information appliances

Trusted Handheld Battlefied Rugged Trusted Host Computer NSA Type 1 Certified, SECRET data in storage, and SECRET data in transit

Add to Reading List

Source URL: www.turtle-mtn.com

Language: English - Date: 2014-10-15 16:14:29
499XTS-400 / Windows Server / Multilevel security / Multiple single-level / Mandatory access control / Client–server model / Security-Enhanced Linux / Trusted computing base / Server / Computer security / Computer network security / Evaluation

MYSEA: The Monterey Security Architecture Cynthia E. Irvine, Thuy D. Nguyen, David J. Shifflett, Timothy E. Levin, Jean Khosalim, Charles Prince, Paul C. Clark and Mark Gondree Department of Computer Science, Naval Postg

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2010-03-24 14:46:06
500Trusted Platform Module / Trusted Computing Group / Next-Generation Secure Computing Base / Trusted Execution Technology / TPM / Random oracle / Secure two-party computation / Direct Anonymous Attestation / Computer security / Trusted computing / Cryptography

Exploring Trusted Platform Module Capabilities: A Theoretical and Experimental Study

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2011-12-22 15:11:06
UPDATE