Trusted Execution Technology

Results: 107



#Item
81Cloud computing / Trusted Execution Technology / Hyper-V / X86 virtualization / Hypervisor / VMware / Virtualization / Rootkit / Virtual Iron / System software / Software / Virtual machines

Trustworthy Cloud Computing Creating Trustworthy Cloud Systems Steve Orrin Director of Security Solutions Software and Services Group Intel, Corp.

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:56
82Trusted Execution Technology / McAfee / Virtual appliance / Hypervisor / System software / Software / VMware

Trusted Geolocation in The Cloud Technical Demonstration NIST Interagency Report[removed]Trusted

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-01 09:17:43
83Computer network security / Crime prevention / National security / Secure communication / Security token / Internet privacy / Trusted Execution Technology / XTS-400 / Computer security / Security / Trusted computing

Trusted Cells: A Sea Change for Personal Data Services Nicolas Anciaux1, 2, Philippe Bonnet3, Luc Bouganim1, 2, Benjamin Nguyen1, 2, Iulian Sandu Popa1, 2, Philippe Pucheral1, 2 1 INRIA Paris-Rocquencourt

Add to Reading List

Source URL: www-smis.inria.fr

Language: English - Date: 2013-10-28 17:28:58
84Gentoo Linux / Trusted computing / Cryptography / Business law / Copyright law / Trusted Execution Technology / Portage / RPM Package Manager / Ebuild / Software / Computer security / System software

SCOBA: Source Code Based Attestation on Custom Software ∗ † Liang Gu‡ , Yao Guo‡ , Anbang Ruan§ , Qingni Shen§ ,Hong Mei‡

Add to Reading List

Source URL: sei.pku.edu.cn

Language: English - Date: 2010-11-12 00:59:22
85Business law / Copyright law / Security / Trusted Platform Module / Trustworthy computing / Trusted Execution Technology / Security-Enhanced Linux / Mandatory access control / Type enforcement / Computer security / Trusted computing / Cryptography

The 9th International Conference for Young Computer Scientists Model–Driven Remote Attestation: Attesting Remote System from Behavioral Aspect Liang Gu1,2 , Xuhua Ding2 , Robert H. Deng2 , Yanzhen Zou1 , Bing Xie1 , W

Add to Reading List

Source URL: sei.pku.edu.cn

Language: English - Date: 2010-11-11 21:16:45
86System software / Trusted computing / Business law / Copyright law / Trusted Execution Technology / Gentoo Linux / Portage / Attestation clause / Virtual machine / Computer security / Software / Cryptography

Practical Property-based Attestation on Free Software Liang Gu1 , Anbang Ruan1,2 , Yao Guo1 , Qingni Shen1,2 , Xiangqun Chen1 Key Laboratory of High Confidence Software Technologies (Ministry of Education), Institute of

Add to Reading List

Source URL: sei.pku.edu.cn

Language: English - Date: 2010-11-12 01:12:37
87Cryptography / Business law / Copyright law / Process management / Trusted Execution Technology / Kernel / Trusted Platform Module / Operating system / Data dependency / Computer security / Computing / Trusted computing

Remote Attestation on Program Execution ∗ Liang Gu1,2 , Xuhua Ding2 , Robert H. Deng2 , Bing Xie1 , Hong Mei1 1 2

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2008-11-03 21:07:22
88Cryptography / Business law / Copyright law / Trusted Execution Technology / Kernel / Mandatory access control / Attestation clause / Law of obligations / Ring / Computer security / Security / Trusted computing

Trusted Isolation Environment: An Attestation Architecture with Usage Control Model Anbang Ruan1,2, Qingni Shen1,2, Liang Gu2,3, Li Wang1,2, Lei Shi2,3, Yahui Yang1,2, and Zhong Chen1,2,3 1

Add to Reading List

Source URL: sei.pku.edu.cn

Language: English - Date: 2010-11-11 21:05:05
89Trusted computing / Disk encryption / Kernel / Trusted Execution Technology / Virtual machine / Ring / Trusted Platform Module / Operating system / Loadable kernel module / Software / Computing / Computer security

SECURITY & PRIVACY Rapid Trust Establishment for Pervasive Personal Computing

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2007-10-30 08:22:15
90Virtual machines / McAfee / X86 architecture / Antivirus software / Companies listed on the New York Stock Exchange / Hypervisor / X86 virtualization / Trusted Execution Technology / Intel / System software / Software / Computing

WHITE PAPER Intel® Xeon® Processors Cloud Security From Silicon to the Data: A Multi-Point Approach for

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:08:10
UPDATE