Trusted Execution Technology

Results: 107



#Item
71Out-of-band management / Computer hardware / Intel vPro / Intel Active Management Technology / Intel / Trusted Execution Technology / X86 virtualization / AES instruction set / Intel AMT versions / System software / X86 architecture / Computing

Sales Brief Top Reasons to Standardize on 4th Gen Intel® Core™ vPro™ Processor Family INTEL® CORE™ vPRO™ PROCESSOR-BASED BUSINESS CLIENTS DELIVER A COLLECTIVE SOLUTION FOR ENTERPRISE-READY SECURITY AND

Add to Reading List

Source URL: arcade.intel.com

Language: English - Date: 2014-04-29 19:40:22
72Cryptography / Open Vulnerability and Assessment Language / TPM / Trusted Computing Group / Trusted Execution Technology / Computer security / Trusted computing / Trusted Platform Module

OVAL + The Trusted Platform Module Charles Schmidt June 14, 2010 © 2008 The MITRE Corporation. All rights reserved

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2010-06-16 09:55:57
73Remote desktop / Trusted computing / Trusted Platform Module / X Window System / Trusted Execution Technology / Google Chrome OS / Thin client / Desktop virtualization / Hyper-V / Software / System software / Computing

Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems Lorenzo Martignoni,∗ Pongsin Poosankam,∗† Matei Zaharia,∗ Jun Han,† Stephen McCamant,∗ Dawn Song,∗ Vern Paxson,∗ Adrian Perri

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2014-10-02 07:34:55
74Computing / Out-of-band management / Intel vPro / Intel Active Management Technology / Intel / Trusted Execution Technology / AES instruction set / X86 virtualization / McAfee / System software / X86 architecture / Computer architecture

Sales Brief Intel and McAfee 2013 Security Benefits Intel and McAfee deliver a new level of strengthened security innovation utilizing embedded hardware security technologies for unprecedented protection and

Add to Reading List

Source URL: mobilecomputing.crn.com

Language: English - Date: 2014-04-08 16:09:09
75Trusted Computing Group / Trusted Execution Technology / Ring / Firmware / Booting / Operating system / BitLocker Drive Encryption / Disk encryption / Computer security / Trusted computing / Trusted Platform Module

Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module Kathleen N. McGill n recent years, mobile devices have replaced desktop PCs as the computing platform of choice for many users. Unfortunately, mos

Add to Reading List

Source URL: techdigest.jhuapl.edu

Language: English - Date: 2013-09-26 17:27:04
76Trusted Computing Group / Trusted Execution Technology / Ring / Firmware / Booting / Operating system / BitLocker Drive Encryption / Disk encryption / Computer security / Trusted computing / Trusted Platform Module

Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module Kathleen N. McGill n recent years, mobile devices have replaced desktop PCs as the computing platform of choice for many users. Unfortunately, mos

Add to Reading List

Source URL: www.jhuapl.edu

Language: English - Date: 2013-09-26 17:27:04
77Malware / Rootkit / Xen / Joanna Rutkowska / Hypervisor / Blue Pill / Citrix Systems / Trusted Execution Technology / Hyper-V / System software / Software / Computer security

Introduction to Qubes OS bhyvecon Tokyo 2014 @ntddk Self-introduction

Add to Reading List

Source URL: bhyvecon.org

Language: English - Date: 2014-03-13 06:01:03
78Intel / Health Insurance Portability and Accountability Act / Computing / Technology / Information technology management / Intel AMT versions / Trusted Execution Technology / Out-of-band management / Intel vPro / Intel Active Management Technology

Client Technologies that Help Assist with Security and Privacy Regulation Compliance David Houlding, Intel Corporation Edward J. Herold, Intel Corporation

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:54
79Trusted Computing Group / Trusted Execution Technology / Open Vulnerability and Assessment Language / Total productive maintenance / Direct TPMS / Computer security / Trusted computing / Trusted Platform Module

Using the Trusted Platform Module to Enhance OVAL Driven Assessments

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2011-03-24 06:59:43
80Trusted computing / Trusted Execution Technology / x86 architecture / Intel / Trusted Computing Group / Ring / Malware / Intel vPro / Computer security / Computer hardware / Computing

Bringing The Trust Back Into Cyber Space: Extending Intel’s commitment to Security Steve Pawlowski Intel Senior Fellow

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:53
UPDATE