Trusted Computing

Results: 881



#Item
801Remote desktop / System software / Virtual Network Computing / Internet protocols / Internet standards / X Window System / Transport Layer Security / GoToMyPC / RFB protocol / Computing / Software / Remote administration software

Securing a Remote Terminal Application with a Mobile Trusted Device Alina Oprea1, Dirk Balfanz2, Glenn Durfee2, D. K. Smetters2 1

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-10-23 17:32:45
802Scottish Enlightenment / Publishing / Bookmark / MARC standards / E-book / Encyclopedia / Library science / Computing / Encyclopædia Britannica

Welcome to Britannica E-STAX Your Gateway to Trusted Nonfiction E-books

Add to Reading List

Source URL: liber.rsuh.ru

Language: English - Date: 2014-04-09 03:52:33
803Computing / Computer architecture / Embedded Linux / Android / Cloud clients / Mandatory access control / Samsung Galaxy S / Mobile operating system / Samsung Galaxy Note / Smartphones / Software / Android devices

Security Enhancements (SE) for Android Stephen Smalley Trusted Systems Research National Security Agency CLASSIFICATION HEADER

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2014-04-23 14:58:00
804Virtual machines / McAfee / X86 architecture / Antivirus software / Companies listed on the New York Stock Exchange / Hypervisor / X86 virtualization / Trusted Execution Technology / Intel / System software / Software / Computing

WHITE PAPER Intel® Xeon® Processors Cloud Security From Silicon to the Data: A Multi-Point Approach for

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:08:10
805Software / Reverse engineering / Information security / Software cracking / Managed Extensions for C++ / Application security / .NET Framework / Vulnerability / Source code / Computing / Computer programming / Computer security

ISSA Preeminent Trusted Global

Add to Reading List

Source URL: cdn-c.preemptive.com

Language: English - Date: 2013-07-31 10:48:02
806Information technology management / Trustworthy computing / Crime prevention / National security / Technology / Trusted system / Computer / Service-oriented architecture / Operating system / Security / Computer security / Computing

Trustworthy Computing Microsoft White Paper Craig Mundie – Senior Vice President and CTO, Advanced Strategies and Policy

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2003-09-10 15:47:31
807Human–computer interaction / User interface / Usability / End-user development / Trusted path / User / Principle of least privilege / User interface design / Customer relationship management / Human–computer interaction / Computing / Software

User Interaction Design for Secure Systems Ka-Ping Yee University of California, Berkeley

Add to Reading List

Source URL: zesty.ca

Language: English - Date: 2002-09-03 04:20:48
808Trusted computing / Microkernel / Security / Trusted computing base / Kernel / Trusted path / L4 microkernel family / Next-Generation Secure Computing Base / Ring / Computer security / Computer architecture / System software

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components —

Add to Reading List

Source URL: os.inf.tu-dresden.de

Language: English - Date: 2004-08-02 05:13:46
809National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing / Trusted computing base / Discretionary access control / Access control / IBM AIX / TCB / Unix / Computer security / Security / Computer architecture

FINAL EVALUATION REPORT The IBM Corporation RS/6000 Distributed System

Add to Reading List

Source URL: www.ashtonlabs.com

Language: English - Date: 2008-08-20 17:11:02
810Trusted third party / Trusted Computing / Secure multi-party computation / Secret sharing / ACM SIGACT / Trusted timestamping / Verifiable secret sharing / Threshold cryptosystem / Secure two-party computation / Cryptography / Cryptographic protocols / Public-key cryptography

Distributed Computing Column 50 Distributing Trusted Third Parties, Innovation Prize, and SIROCCO Review

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-05-16 05:06:00
UPDATE