Trusted Computing

Results: 881



#Item
651Trusted computing base / Trustworthy computing / Trusted Computing / Trusted system / Ring / Operating system / Vulnerability / Multilevel security / XTS-400 / Computer security / Security / Cyberwarfare

/tardir/tiffs/a408641.tiff

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2004-07-15 16:12:11
652Cryptography / Trusted computing

Training Policy Manual (TPM) - REVIEW DOCUMENT ATO:

Add to Reading List

Source URL: tc.gc.ca

Language: English - Date: 2010-05-04 09:54:43
653Crime prevention / National security / Trusted Computer System Evaluation Criteria / Trusted computing / Multilevel security / Protection Profile / Trusted computing base / Common Criteria / Evaluation Assurance Level / Computer security / Security / Evaluation

Trusted Computing Exemplar[removed]Developments NPS-CS[removed]NPS-CS[removed]

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2006-08-07 10:26:16
654Computer network security / Trusted computing base / Operating system / Server / Trusted Computing / Kernel / Ring / XTS-400 / Security-Enhanced Linux / Computer security / Computer architecture / Security

/tardir/tiffs/a408173.tiff

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2004-07-15 16:23:12
655Access control / Computer security / Identity management / File system / Authorization / Tar / Trusted Computing / Internet privacy / Tag / Computing / System software / Information

Toward strong, usable access control for shared distributed data Michelle L. Mazurek, Yuan Liang, William Melicher, Manya Sleeper, Lujo Bauer, Gregory R. Ganger, Nitin Gupta, and Michael K. Reiter* Carnegie Mellon Univer

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2014-02-11 18:31:55
656Crime prevention / National security / Computer network security / Security policy / Information security / Trusted computing base / Access control / Security service / Quality of service / Security / Computer security / Computing

/tardir/tiffs/A366306.tiff

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2004-07-21 14:39:49
657Trusted computing base / Mandatory access control / Trusted Computing / Microkernel / Ring / Kernel / Operating system / Trustworthy computing / Security kernel / Computer security / Security / Computing

/tardir/tiffs/a408429.tiff

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2004-07-15 15:52:20
658Hardware virtualization / Hardware-assisted virtualization / Virtualization / Hypervisor / X86 virtualization / Paravirtualization / Virtual private server / Xen / VirtualBox / System software / Software / Virtual machines

Towards Using a Trusted Computing Base for Security in Virtual Machines Belinda Marie Deci E00818003

Add to Reading List

Source URL: www.emich.edu

Language: English - Date: 2012-02-23 14:57:35
659Marketing / Electronic commerce / Business law / Copyright law / Internet privacy / Information privacy / Consumer privacy / Trusted Computing / Electronic money / Privacy / Ethics / Business

Economic Barriers to the Deployment of Existing Privacy Technologies (Position Paper) Joan Feigenbaum1 , Michael J. Freedman2 , Tomas Sander3 , Adam Shostack4 1

Add to Reading List

Source URL: www2.sims.berkeley.edu

Language: English - Date: 2002-05-19 11:15:59
660Antivirus software / Microsoft Forefront / Windows Server / Microsoft SharePoint / Azure Services Platform / Microsoft Security Essentials / Microsoft Online Services / Microsoft Office / Computer security / Software / Computing / System software

Microsoft technology solutions for cybersecurity For every phase of this security management life cycle, Microsoft provides trusted advice and technology solutions that play a critical role in helping to ensure the safet

Add to Reading List

Source URL: fedstelework.com

Language: English - Date: 2010-09-22 09:57:08
UPDATE