Trusted Computing

Results: 881



#Item
511Crime prevention / National security / Evaluation / Common Criteria / Microsoft PowerPoint / National Security Agency / Information security / Trusted Computer System Evaluation Criteria / Trusted system / Computer security / Security / Computing

19th National Information Systems Security Conference Proceedings This is the table of contents to the papers, panel statements and presentations which were submitted in electronic form. Each paper was converted to Adobe

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2005-04-18 01:00:00
512Privacy / Identity management / Social issues / Data protection / Information privacy / Internet privacy / TRUSTe / Ethics / Cloud computing / Computing

Invitation for “Assessing Privacy Commitments for Trusted Cloud” Workshop in the framework of 36 International Conference of Data Protection and Privacy Commissioners in Mauritius th The Mauritius Chamber of Commerc

Add to Reading List

Source URL: www.privacyconference2014.org

Language: English - Date: 2014-09-19 06:20:30
513Security / FIPS 140 / Trusted Computing Group / Trusted Computing / Critical Security Parameter / Authentication / Zeroisation / Key management / Cryptography / Computer security / Cryptography standards

Microsoft Word - 2o - Security Policy KCF-1.2 .doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-09 11:11:13
514Cloud computing / Computer network security / Crime prevention / National security / Secure communication / Trusted computing base / Trusted Computing / Gemalto / Multilevel security / Security / Computer security / Computing

PDF Document

Add to Reading List

Source URL: www.celticplus.eu

Language: English - Date: 2014-04-27 08:27:30
515Computing / Hardware-based full disk encryption / BitLocker Drive Encryption / Encryption / Windows Vista / Backup / Disk encryption hardware / Trusted Storage specification / Disk encryption / Software / Microsoft Windows

FDE Performance Comparison Hardware Versus Software Full Drive Encryption A look at performance and other differences between hardware based self-encrypting drives and software approaches to full disk

Add to Reading List

Source URL: www.security-innovation.org

Language: English - Date: 2010-07-13 00:31:43
516Ubiquitous computing / Institute of Electrical and Electronics Engineers / Computing / Informatics / Computer science / Knowledge / Ethology / Science / International nongovernmental organizations / Computer museum

INFORMATION PROCESSING SOCIETY OF JAPAN No.1 Trusted IT Professional Society in Japan

Add to Reading List

Source URL: www.ipsj.or.jp

Language: English - Date: 2013-07-21 21:27:33
517Computing / Cyberwarfare / Crime prevention / National security / Federal Information Security Management Act / National Institute of Standards and Technology / FIPS 140-2 / National Strategy for Trusted Identities in Cyberspace / National Cybersecurity Center / Computer security / Security / Computer network security

Testimony of Charles H. Romine Director Information Technology Laboratory National Institute of Standards and Technology

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2014-03-06 12:33:10
518Computer crimes / Government / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Computing / Federal Information Security Management Act / National Institute of Standards and Technology / National Cybersecurity Center / National Strategy for Trusted Identities in Cyberspace / Cyberwarfare / Computer security / United States Department of Homeland Security

Testimony of Patrick D. Gallagher, Ph.D. Under Secretary of Commerce for Standards and Technology United States Department of Commerce

Add to Reading List

Source URL: nist.gov

Language: English - Date: 2013-06-14 11:46:47
519Virtual machines / Trusted computing / Programming language implementation / VM / Hypervisor / Operating system / Computing platform / Next-Generation Secure Computing Base / Microkernel / System software / Software / VMware

Terra: A Virtual Machine-Based Platform for Trusted Computing Tal Garfinkel Ben Pfaff Jim Chow Mendel Rosenblum

Add to Reading List

Source URL: benpfaff.org

Language: English - Date: 2014-11-24 21:25:49
520ESET NOD32 / Microsoft Windows / ESET / Computing / Antivirus software / Software / System software

www.eset.com Become an ESET Managed Service Provider Proven. Trusted.

Add to Reading List

Source URL: static4.esetstatic.com

Language: English - Date: 2013-03-01 03:51:41
UPDATE