Trusted Computing

Results: 881



#Item
541Internet / Security / Cryptography / Computer security / Information security / Encryption / Email / Internet privacy / Computing

Success Story A Trusted Choice Bank Rhode Island looks to Zix Corporation for email encryption

Add to Reading List

Source URL: www.zixcorp.com

Language: English
542Computing / Computer network security / National Strategy for Trusted Identities in Cyberspace / Internet Society / Open standard / Internet Engineering Task Force / CaBIG / Internet governance / Medicine / Internet

Annie Sokol National Institute of Standards and Technology 100 Bureau Drive, Mailstop 8930, Gaithersburg, MD[removed]By electronic mail: [removed] Response by the Internet Society to the

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-22 22:55:18
543Internet Engineering Task Force / Governance / American National Standards Institute / Computing / Political science / Technology / Standards organizations / Computer network security / National Strategy for Trusted Identities in Cyberspace

COMMENTS ON NOTICE OF INQUIRY Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace 76 FR[removed]DOCUMENT NUMBER[removed]DEPARTMENT OF COMMERCE NATIONAL INSTITUTE OF STANDARDS

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-22 09:44:42
544Networx / Network architecture / Computer network security / Computer architecture / Internet / Voice over IP / Virtual private network / IPv6 / Computing / Internet in the United States / Managed Trusted Internet Protocol Service

Microsoft PowerPoint - Sanjeev Bhagowalia ITPA Briefing[removed]ppt

Add to Reading List

Source URL: oimt.hawaii.gov

Language: English - Date: 2012-11-26 15:44:42
545National Strategy for Trusted Identities in Cyberspace / Semantic Web / Service-oriented architecture / Cloud computing / Interoperability / Linked data / Computing / Web services / Computer network security

Fall Cubicon Trusted Infrastructure for the Ambient Cloud Architectural solutions to

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-08-17 13:04:08
546Stakeholder / Steering / Internet Engineering Task Force / Computing / Public opinion / Computer network security / National Strategy for Trusted Identities in Cyberspace / Internet governance

Microsoft Word - CertiPath_NOI Response.docx

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-28 12:04:50
547Identity / P3P / Internet privacy / National Strategy for Trusted Identities in Cyberspace / Information privacy / Personally identifiable information / FTC Fair Information Practice / Privacy-enhancing technologies / Privacy / Ethics / Computing

NIST/NSTIC-IDtrust 2012-Privacy Mgmt: A Positive Perspective on Privacy Standardization

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 10:10:28
548Road transport in Canada / National Strategy for Trusted Identities in Cyberspace / Computing / Computer security / Privacy / Identity management / Identity theft / Online identity / Internet privacy / Identity / Ethics / American Association of Motor Vehicle Administrators

FOR IMMEDIATE RELEASE September 20, 2012 Contact: Claire O’Brien, AAMVA Marketing Coordinator[removed]; [removed]

Add to Reading List

Source URL: www.aamva.org

Language: English - Date: 2012-09-20 15:52:04
549Social issues / Human rights / Policy / Privacy policy / Internet privacy / Trusted Computing / Ethics / Privacy / Identity management

Privacy in ITS Applications Workshop! Berlin, 20 July 2010! The PRECIOSA Architecture for Enforcement of Privacy Policies!

Add to Reading List

Source URL: www.preciosa-project.org

Language: English - Date: 2010-08-23 03:52:51
550Computing / Out-of-band management / Intel vPro / Intel Active Management Technology / Intel / Trusted Execution Technology / AES instruction set / X86 virtualization / McAfee / System software / X86 architecture / Computer architecture

Sales Brief Intel and McAfee 2013 Security Benefits Intel and McAfee deliver a new level of strengthened security innovation utilizing embedded hardware security technologies for unprecedented protection and

Add to Reading List

Source URL: smb.intel.in

Language: English - Date: 2013-08-23 21:00:30
UPDATE