Trusted Information Systems

Results: 75



#Item
31Arizona Department of Public Safety / Information Sharing Environment / National security / Government / Security / Surveillance / Regional Information Sharing Systems / Automated Trusted Information Exchange

Information Sharing • Officer Safety • Investigative Services Criminal Justice Partnerships • Advanced Technology FY2013 ANNUAL REPORT Table of Contents

Add to Reading List

Source URL: www.riss.net

Language: English - Date: 2014-10-02 10:54:57
32Computing / Search algorithms / Data / Information / Database management systems / Hash function / Hash tree / Hash list / Trie / Error detection and correction / Cryptographic hash functions / Hashing

METHODOLOGY: TRUSTED ARCHIVE ARCHIVE RECONCILIATION AT MASSIVE SCALE USING MERKEL TREES

Add to Reading List

Source URL: www.bloomberg.com

Language: English - Date: 2014-11-25 15:11:47
33National security / Evaluation / Computer network security / Trusted computing base / Multilevel security / National Information Assurance Partnership / Mandatory access control / Trusted Computer System Evaluation Criteria / Common Criteria / Computer security / Security / Crime prevention

Engineering Secure Systems Lessons Learned from Building a High-Assurance Crypto Gateway The construction of a complex secure system composed

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2012-10-30 13:53:03
34Cyberwarfare / Trusted Information Systems / Firewall / Telecommuting / Operating system / Cryptography / Personal firewall / Computer network security / Security / Computer security

PANEL TITLE: Your Always-On Connection & the Telecommuter PANEL CHAIR: Peter Dinsmore, NAI Labs, Network Associates PANELISTS: Michael StJohns, Excite@Home

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
35Evaluation / Data security / National Information Assurance Partnership / Common Criteria / Capability Maturity Model / National Security Agency / Rainbow Series / Trusted Computer System Evaluation Criteria / Information security / Computer security / Security / Computing

The National Security Agency’s Use of the Systems Security Engineering Capability Maturity Model (SSE-CMM) Panel Chair: Ms. Mary D. Schanken National Security Agency 9800 Savage Road

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
36Public safety / Data security / Computer security / Information security / Trusted Information Systems / Public key infrastructure / Peter G. Neumann / RISKS Digest / Security / Crime prevention / National security

From Evolution to Revolution: The Founders and the Headliners of Information Security Georgia Tech Information Security Center Panel session, 22nd National Information Systems Security Conference Fall, 1999 Panel Chair:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
37National Information Assurance Partnership / Protection Profile / Evaluation Assurance Level / Security Target / ITSEC / Trusted Computer System Evaluation Criteria / Validation / Systems engineering process / Cryptographic Module Testing Laboratory / Computer security / Evaluation / Common Criteria

COMMON CRITERIA EVALUATIONS IN THE US: WHAT A DEVELOPER SHOULD KNOW Kimberly S. Caplan Douglas Stuart, CISSP Computer Sciences Corporation 7471 Candlewood Rd Hanover, MD 21076

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
38Crime prevention / National security / Evaluation / Common Criteria / Microsoft PowerPoint / National Security Agency / Information security / Trusted Computer System Evaluation Criteria / Trusted system / Computer security / Security / Computing

19th National Information Systems Security Conference Proceedings This is the table of contents to the papers, panel statements and presentations which were submitted in electronic form. Each paper was converted to Adobe

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2005-04-18 01:00:00
39Manufacturing / Electronics / Virtual Storage Platform / Geographic information system / Hitachi Data Systems History / Hitachi Global Storage Technologies / Technology / Hitachi / Hitachi Data Systems

OUR VISION TRANSFORM VIRTUALIZATION ECONOMICS RELIABLE TRUSTED INNOVATE INFORMAT GLOBAL CHANGE INTELLIGENT TECHNOLOGY VISION SERVICES VALUE INSIGHT OPPO TY SOCIAL INFRASTRUCTURE INTEGRATE ANALYZE DISCOVER COMPETITIVE AD

Add to Reading List

Source URL: www.hds.com

Language: English
40BAE Systems / Defense Information Systems Agency / Computer security / Transglobal Secure Collaboration Project / Computer network security / Security / National Strategy for Trusted Identities in Cyberspace

TSCP Newsletter July 2013 • Volume 2 : Issue 3 In this Issue: November Symposium Capabilities Brochure

Add to Reading List

Source URL: www.tscp.org

Language: English - Date: 2013-10-25 16:16:27
UPDATE