Trusted Execution Technology

Results: 107



#Item
61Cloud computing / Virtual machines / Data center / Hypervisor / Virtualization / Trusted Execution Technology / Hyper-V / IBM cloud computing / Intelligent workload management / System software / Computing / Software

Solution Brief HyTrust® Boundary Controls: Policy-based Control for Virtual Workloads Summary

Add to Reading List

Source URL: www.hytrust.com

Language: English - Date: 2014-09-18 14:50:40
62Security / Disk encryption / Trusted Platform Module / Trusted Execution Technology / Next-Generation Secure Computing Base / Ring / Security token / Physical Unclonable Function / Trusted computing base / Computer security / Trusted computing / Cryptography

INVITED PAPER Mobile Trusted Computing This paper surveys the trusted computing features in mobile computing platforms. By N. Asokan, Jan-Erik Ekberg, Kari Kostiainen, Anand Rajan, Carlos Rozas,

Add to Reading List

Source URL: rebootingcomputing.ieee.org

Language: English - Date: 2014-08-25 09:54:55
63Cryptography / Open Vulnerability and Assessment Language / Trusted Computing Group / Trusted Execution Technology / Computer security / Trusted computing / Trusted Platform Module

Trusted Computing in OVAL Charles Schmidt March 24, 2011 HS SEDI is a trademark of the U.S. Department of Homeland Security. © 2011 The MITRE Corporation. All Rights Reserved.

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:32:01
64Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Next-Generation Secure Computing Base / Counter / Cryptographic hash function / Extensible Storage Engine / Computer security / Trusted computing / Cryptography

Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR[removed]September 11, 2006

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2006-09-12 07:35:22
65Trusted computing / Smart cards / Public-key cryptography / Closure / Subroutines / Trusted Platform Module / Variable / Java Card / Trusted Execution Technology / Cryptography / Computer security / Computing

The Trusted Execution Module: Commodity General-Purpose Trusted Computing Victor Costan, Luis F. G. Sarmenta, Marten van Dijk, and Srinivas Devadas MIT Computer Science and Artificial Intelligence Laboratory, Cambridge,

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2008-09-09 21:32:55
66Error detection and correction / Cryptography / Cryptographic hash functions / Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Next-Generation Secure Computing Base / Counter / Hash tree / Computer security / Trusted computing / Hashing

Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS ∗ Luis F. G. Sarmenta, Marten van Dijk, Charles W. O’Donnell, Jonathan Rhodes, and Srinivas Devadas

Add to Reading List

Source URL: projects.csail.mit.edu

Language: English - Date: 2006-08-31 18:21:40
67Trusted computing / Virtual machines / Windows Server / Trusted Execution Technology / x86 architecture / Trusted Platform Module / Virtual appliance / Hypervisor / Cloud computing / System software / Software / Computing

LNCS[removed]Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2012-01-13 12:57:13
68Trusted Platform Module / Smart card / Passphrase / Direct Anonymous Attestation / Trusted Execution Technology / Computer security / Cryptography / Trusted computing

Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel (short paper) Russell A. Fink1,2 , Alan T. Sherman2 , Alexander O. Mitchell3 , and David C. Challener1 1

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2012-01-13 15:12:16
69Trusted Platform Module / Trusted computing base / Virtual machine / Ring / Rootkit / Trusted Execution Technology / Trusted Computing Group / Computer security / Trusted computing / Cryptography

TrustVisor: Efficient TCB Reduction and Attestation Jonathan M. McCune, Ning Qu, Yanlin Li Anupam Datta, Virgil D. Gligor, Adrian Perrig March 9, 2009 (revised March 10, 2010)

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-07-09 18:37:15
70X86 architecture / Out-of-band management / Intel vPro / Trusted computing / Intel Active Management Technology / Intel / Trusted Execution Technology / X86 virtualization / AES instruction set / Computing / System software / Computer architecture

September[removed]Real-World Guide Enterprise Mobile Security: 4th Generation Intel® Core™

Add to Reading List

Source URL: mobilecomputing.crn.com

Language: English - Date: 2014-04-08 16:16:44
UPDATE