Trusted Computing

Results: 881



#Item
51Reuse of evidences and evaluation results Carolina Lavatelli, Trusted Labs (on behalf of ISCI)  © 2012 Trusted Labs S.A.S.

Reuse of evidences and evaluation results Carolina Lavatelli, Trusted Labs (on behalf of ISCI) © 2012 Trusted Labs S.A.S.

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2012-09-06 07:18:36
52Trusted Computing Platform Alliance: The Mother(board) of all Big Brothers Lucky Green cypherpunks.to

Trusted Computing Platform Alliance: The Mother(board) of all Big Brothers Lucky Green cypherpunks.to

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2011-09-20 13:07:03
53Elisa Bertino Professor of Computer Science Professor of Electrical and Computer Engineering (courtesy) Research Director of CERIAS Director of Cyber Center, Discovery Park

Elisa Bertino Professor of Computer Science Professor of Electrical and Computer Engineering (courtesy) Research Director of CERIAS Director of Cyber Center, Discovery Park

Add to Reading List

Source URL: www.issnaf.org

Language: English - Date: 2015-03-14 05:32:13
54Trusted Computing Exemplar Project Cynthia E. Irvine, Timothy E. Levin, Thuy Nguyen, George W. Dinolt Center for Information Systems Security Studies and Research (CISR) Naval Postgraduate School The science and discipli

Trusted Computing Exemplar Project Cynthia E. Irvine, Timothy E. Levin, Thuy Nguyen, George W. Dinolt Center for Information Systems Security Studies and Research (CISR) Naval Postgraduate School The science and discipli

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2007-11-15 12:21:56
    55A Security Domain Model for Implementing Trusted Subject Behaviors Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Timothy Levin  Naval Postgraduate School, Computer Science Department, 1411 Cunningham Rd., Monterey, Ca

    A Security Domain Model for Implementing Trusted Subject Behaviors Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Timothy Levin  Naval Postgraduate School, Computer Science Department, 1411 Cunningham Rd., Monterey, Ca

    Add to Reading List

    Source URL: cisr.nps.edu

    Language: English - Date: 2008-08-18 13:41:12
    56Trusted Computing white paper 21May02a.PDF

    Trusted Computing white paper 21May02a.PDF

    Add to Reading List

    Source URL: www.cisr.us

    Language: English - Date: 2007-11-15 12:21:44
      57To appear in the 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS).  Timing-Accurate TPM Simulation for What-If Explorations in Trusted Computing Vandana Gunupudi

      To appear in the 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS). Timing-Accurate TPM Simulation for What-If Explorations in Trusted Computing Vandana Gunupudi

      Add to Reading List

      Source URL: nsl.cse.unt.edu

      Language: English - Date: 2012-01-08 09:38:06
        58Toward strong, usable access control for shared distributed data

        Toward strong, usable access control for shared distributed data

        Add to Reading List

        Source URL: manyasleeper.com

        Language: English - Date: 2015-07-08 14:57:22
        59ARCHITECT’S GUIDE: CYBERSECURITY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

        ARCHITECT’S GUIDE: CYBERSECURITY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

        Add to Reading List

        Source URL: www.trustedcomputinggroup.org

        Language: English - Date: 2013-12-06 18:21:27
          60A Logic of Secure Systems and its Application to Trusted Computing Anupam Datta Jason Franklin  Deepak Garg

          A Logic of Secure Systems and its Application to Trusted Computing Anupam Datta Jason Franklin Deepak Garg

          Add to Reading List

          Source URL: www.cs.cmu.edu

          Language: English - Date: 2009-06-02 14:26:22