Trusted Computing

Results: 881



#Item
731Cloud infrastructure / Cloud communications / Cloud collaboration / Cloud computing / Centralized computing / Computing

Establishing a Trusted Cloud Europe A policy vision document by the Steering Board of the European Cloud Partnership

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2014-03-21 12:14:51
732Telecommunications / Cloud infrastructure / Software as a service / Software distribution / Provisioning / Service delivery platform / IBM cloud computing / Enomaly Inc / Cloud computing / Centralized computing / Computing

Parallels Automation White Paper Parallels Automation – Trusted by Top Service Providers Worldwide

Add to Reading List

Source URL: www.parallels.com

Language: English - Date: 2014-06-17 16:20:17
733Computing / Federal Information Security Management Act / Risk management framework / Security controls / Certified Information Systems Security Professional / Health Insurance Portability and Accountability Act / Computer security / Data security / Security

JD Biggs & Associates, Inc. Your Trusted Partner for Improved Security & Privacy   JD  Biggs  is  an  Information  Security  and  Privacy  consulting  firm  located  near  Washingto

Add to Reading List

Source URL: www.jdbiggs.com

Language: English - Date: 2012-05-15 09:35:37
734Technology / Public administration / Computing / Identity / Interoperability / E-Authentication / European Interoperability Framework / Eid / EGovernment in Europe / Federated identity / Identity management / Computer security

European Commission Information Society and Media Directorate-General Towards a Trusted and Sustainable

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2012-08-28 07:54:39
735Computer law / Federal Information Security Management Act / Security / Certified Information Systems Security Professional / Cloud computing / Computer security / Data security / Computing

JD Biggs & Associates, Inc. Your Trusted Partner for Improved Security & Privacy   JD  Biggs  is  an  Information  Security  and  Privacy  consulting  firm  located  near  Washingto

Add to Reading List

Source URL: www.jdbiggs.com

Language: English - Date: 2012-05-15 09:35:45
736Cyberwarfare / Computer law / Software testing / Federal Information Security Management Act / Certified Information Systems Security Professional / Vulnerability / Computer security / Data security / Computing

JD Biggs & Associates, Inc. Your Trusted Partner for Improved Security & Privacy   JD  Biggs  is  an  Information  Security  and  Privacy  consulting  firm  located  near  Washingto

Add to Reading List

Source URL: www.jdbiggs.com

Language: English - Date: 2012-05-15 09:34:44
737Disk encryption / Computer peripherals / Disk enclosure / Laptop / Trusted Platform Module / Hard disk drive / USB flash drive / Computer hardware / Computing / Computer storage media

Microsoft Word - Preservation of ESI After Layoffs.docx

Add to Reading List

Source URL: www.craigball.com

Language: English - Date: 2009-05-06 23:42:49
738Technology / Internal Market Information System / Computing / Electronics / EGovernment in Europe / Semantic Interoperability Centre Europe / Public administration / European Interoperability Framework / Interoperability

[removed]TRUSTED EXCHANGE PLATFORM (E-TRUSTEX)

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2014-05-12 10:17:31
739Secure communication / Trusted computing / National security / Trusted system / Multics / Bell–LaPadula model / Trusted Computer System Evaluation Criteria / Operating system / Secure state / Computer security / Security / Computer network security

Looking Back at the Bell-La Padula Model David Elliott Bell Reston VA, 20191 December 7, 2005 Abstract

Add to Reading List

Source URL: selfless-security.offthisweek.com

Language: English - Date: 2009-04-05 14:51:44
740Internet / Email / Data privacy / Social issues / Internet privacy / Information privacy / Data Protection Act / HTTP cookie / Personally identifiable information / Ethics / Computing / Privacy

ESTRO PRIVACY AND DATA SECURITY NOTICE This Data Privacy and Security Policy is a dynamic document, which will reflect our continuing vigilance to properly handle and secure information that we are trusted to maintain.

Add to Reading List

Source URL: estro.org

Language: English - Date: 2013-10-16 10:34:47
UPDATE