Trusted Computing

Results: 881



#Item
521Software / Windows Server / Operating system / Trusted Computing / Trusted Platform Module / Multilevel security / Microsoft Windows / Computer security / Windows NT

TVE Trusted Multilevel Computing Solution Simultaneous View of Multiple Security Levels on a Single Computer Overview TVE is a multilevel computing solution that allows users to simultaneously view and access multiple se

Add to Reading List

Source URL: www.gdc4s.com

Language: English - Date: 2014-12-03 04:04:55
522Data security / Crime prevention / National security / Cryptography / Trusted Computing Group / Trusted Computing / Information security management system / Trusted Platform Module / Vulnerability / Computer security / Security / Cyberwarfare

ENISA Quarterly Review Vol. 4, No. 4, Oct-Dec 2008 IN THIS EDITION A Letter from the Executive Director

Add to Reading List

Source URL: www.warp.gov.uk

Language: English - Date: 2014-09-22 09:11:24
523Warp drive / Computing / Internet governance / WARP

WTB[removed]Incident Reporting Form for the WARP Trusted Sharing service V1.0 Document type: Example

Add to Reading List

Source URL: www.warp.gov.uk

Language: English - Date: 2014-09-22 09:11:24
524World Wide Web / Identity / Identity management / Federated identity / Knowledge representation / Security Assertion Markup Language / Linked data / Authentication / OpenID / Semantic Web / Computing / Security

APA VIVO: A Semantic Framework for Scholarly Identity and Trusted Attribute Exchange Hal Warren and Eva Winer American Psychological Association, Washington, DC, USA {hwarren,ewiner}@apa.org

Add to Reading List

Source URL: 2012.eswc-conferences.org

Language: English - Date: 2012-07-23 09:47:35
525Virtual machines / Multilevel security / Virtualization / Virtuality / Trusted Computing Group / Ring / Hypervisor / Virtual private network / Intel vPro / System software / Computing / Software

Secure Virtualization: Today’s Reality Secure virtualization is an exciting new technology that allows you to secure your computing systems, networks, and data while simultaneously remaining connected to trusted and un

Add to Reading List

Source URL: www.gdc4s.com

Language: English - Date: 2014-12-03 04:04:56
526OSI protocols / TREX / S/MIME / MIME / Secure messaging / Email / Computing / Internet

. . . Adds formal and secure messaging services to the commercial Microsoft Exchange™ server. Trusted Exchange[removed]TREX2010) is a ‘bolt-on’ product to the standard Microsoft Exchange 2010 GroupWare

Add to Reading List

Source URL: www.commpower.com

Language: English - Date: 2014-11-05 13:12:41
527National security / Public safety / Trusted computing / Cryptography / Trusted Platform Module / Computer network security / Corporate Ink / Trusted Computing Group / Information security / Security / Computer security / Crime prevention

Wave Systems Joins TSCP Membership Grows As Solutions Providers Commit to Driving Adoption of Secure Information Sharing Standards HERNDON, Va. (Dec. 21, 2009) ─ Wave Systems Corp. (NASDAQ: WAVX -- www.wave.com), a lea

Add to Reading List

Source URL: www.tscp.org

Language: English - Date: 2013-09-16 22:08:03
528Cryptography / Distributed computing architecture / Mobile agent / Software agent / Agent-based model / Aglets / Trusted Computing / Threat / Computer security / Computing / Multi-agent systems / Computer network security

Countermeasures for Mobile Agent Security Wayne A. Jansen National Institute of Standards and Technology Gaithersburg, MD 20899, USA [removed] Abstract: Security is an important issue for the widespread deployment

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
529Identity Commons / Internet Governance Forum / Stakeholder / Governance / Liberty Alliance / Working group / Computing / Political science / Internet / Computer network security / National Strategy for Trusted Identities in Cyberspace / Internet governance

Microsoft Word - Identity Commons_NSTIC Governance NOI[removed]Response.docx

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-09-13 08:46:56
530Governance / Industries / Political geography / Political philosophy / National Strategy for Trusted Identities in Cyberspace / ICANN / Political science / Computing / Internet governance / Internet / Accountability

Microsoft Word - MIT_NSTIC response to LOI[removed]v0.docx

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-09-13 08:48:16
UPDATE