Trusted Computing

Results: 881



#Item
551Cloud computing / Virtual machines / Data center / Hypervisor / Virtualization / Trusted Execution Technology / Hyper-V / IBM cloud computing / Intelligent workload management / System software / Computing / Software

Solution Brief HyTrust® Boundary Controls: Policy-based Control for Virtual Workloads Summary

Add to Reading List

Source URL: www.hytrust.com

Language: English - Date: 2014-09-18 14:50:40
552Evaluation / Trusted computing base / Microkernel / L4 microkernel family / Real-time operating systems / Gernot Heiser / Formal verification / Isabelle / Formal methods / Computer security / Computer architecture / Computing

Mathematically Verified Software Kernels: Raising the Bar for High Assurance Implementations Dr Daniel Potts, VP of Engineering, General Dynamics C4 Systems Rene Bourquin, Member Technical Staff, General Dynamics C4 Syst

Add to Reading List

Source URL: sel4.org

Language: English - Date: 2014-07-28 22:03:39
553Computing / Evaluation / EDXL / OASIS / National Strategy for Trusted Identities in Cyberspace / Open standard / Markup languages / American National Standards Institute / Smart grid / Standards organizations / XML / Standards

July 22, 2011 National Institute of Standards and Technology Attn: Annie Sokol 100 Bureau Drive, Mailstop 8930 Gaithersburg, Maryland[removed]By electronic mail to [removed]

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-22 21:37:22
554Governance / Social philosophy / Internet Engineering Task Force / AccountAbility / Computing / Ethics / Computer network security / National Strategy for Trusted Identities in Cyberspace / Internet governance

SCA NSTIC NOI Response - Final[removed]

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2011-07-22 03:13:14
555Compiler optimizations / Greg Morrisett / Year of birth missing / Computer security / Inline expansion / Trusted computing base / Java / Computing / Software engineering / Programming language theory

THE INLINED REFERENCE MONITOR APPROACH TO SECURITY POLICY ENFORCEMENT A Dissertation Presented to the Faculty of the Graduate School of Cornell University

Add to Reading List

Source URL: www.ru.is

Language: English - Date: 2003-11-11 14:39:56
556Internet / Internet protocols / Secure communication / Computing / Data / Transport Layer Security / TransPerfect / Cryptographic protocols / Internet standards

TRANSPERFECT LEGAL SOLUTIONS Meeting Your Global Legal Support Needs In Over 100 Languages For over 16 years, TLS has been the trusted provider of legal support services to every

Add to Reading List

Source URL: www.transperfectlegal.com

Language: English - Date: 2013-10-28 12:12:25
557Trusted computing / Key management / Trusted Platform Module / Cryptographic software / Trusted Computing Group / BitLocker Drive Encryption / Key size / Key / Crypt / Cryptography / Computer security / Disk encryption

Tech Digest Figure Template_1.5 column_01-06-12

Add to Reading List

Source URL: techdigest.jhuapl.edu

Language: English - Date: 2013-09-26 17:29:37
558Software engineering / Code / Law / Codification / C / Programming language theory / Legal codes / Procedural programming languages / Computing

Products and Services Best-in-Class Codification Solutions General Code has the long-term experience and trusted services that thousands of municipalities already depend on, and we’re ready to partner with your communi

Add to Reading List

Source URL: www.generalcode.com

Language: English - Date: 2014-11-02 23:03:06
559Scottish Enlightenment / Publishing / Bookmark / MARC standards / E-book / Encyclopedia / Library science / Computing / Encyclopædia Britannica

Welcome to Britannica E-STAX Your Gateway to Trusted Nonfiction E-books ebooks.eb.com Now you can enjoy anytime access to hundreds of Britannica E-Books all from one convenient site. E-Stax™, our multi-feature platform

Add to Reading List

Source URL: info.eb.com

Language: English - Date: 2014-05-06 15:41:03
560Security / Disk encryption / Trusted Platform Module / Trusted Execution Technology / Next-Generation Secure Computing Base / Ring / Security token / Physical Unclonable Function / Trusted computing base / Computer security / Trusted computing / Cryptography

INVITED PAPER Mobile Trusted Computing This paper surveys the trusted computing features in mobile computing platforms. By N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos Rozas,

Add to Reading List

Source URL: rebootingcomputing.ieee.org

Language: English - Date: 2014-08-25 09:54:55
UPDATE