Trusted computing base

Results: 152



#Item
101Cryptography / Trusted Platform Module / Next-Generation Secure Computing Base / Cloud computing / Node / Eucalyptus / Public-key cryptography / Computer security / Trusted computing / Computing

Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services Nuno Santos, Rodrigo Rodrigues†, Krishna P. Gummadi, Stefan Saroiu‡ MPI-SWS, † CITI/Universidade Nova de Lisboa, ‡ Microsoft Research Abst

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2012-07-17 05:59:19
102National security / Trusted computing base / Trusted Computing / Internet privacy / Public safety / Multilevel security / Security / Computer security / Crime prevention

Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection Petros Maniatis† , Devdatta Akhawe∗ , Kevin Fall† , Elaine Shi∗‡ , Stephen McCamant∗ , Dawn Song∗ ‡ PARC, ∗ UC Berkel

Add to Reading List

Source URL: devd.me

Language: English - Date: 2015-03-02 02:58:50
103Spyware / Computer network security / Computer security / Malware / Cryptography / Trusted computing base / Threat / Firmware / Backdoor / Cyberwarfare / Espionage / Security

Trojan hardware – some strategies and defenses Markus Kuhn Computer Laboratory http://www.cl.cam.ac.uk/~mgk25/

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-06-17 17:30:34
104Trusted computing base / Trustworthy computing / Trusted Computing / Trusted system / Ring / Operating system / Vulnerability / Multilevel security / XTS-400 / Computer security / Security / Cyberwarfare

/tardir/tiffs/a408641.tiff

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2004-07-15 16:12:11
105Crime prevention / National security / Trusted Computer System Evaluation Criteria / Trusted computing / Multilevel security / Protection Profile / Trusted computing base / Common Criteria / Evaluation Assurance Level / Computer security / Security / Evaluation

Trusted Computing Exemplar[removed]Developments NPS-CS[removed]NPS-CS[removed]

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2006-08-07 10:26:16
106Computer network security / Trusted computing base / Operating system / Server / Trusted Computing / Kernel / Ring / XTS-400 / Security-Enhanced Linux / Computer security / Computer architecture / Security

/tardir/tiffs/a408173.tiff

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2004-07-15 16:23:12
107Crime prevention / National security / Computer network security / Security policy / Information security / Trusted computing base / Access control / Security service / Quality of service / Security / Computer security / Computing

/tardir/tiffs/A366306.tiff

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2004-07-21 14:39:49
108Trusted computing base / Mandatory access control / Trusted Computing / Microkernel / Ring / Kernel / Operating system / Trustworthy computing / Security kernel / Computer security / Security / Computing

/tardir/tiffs/a408429.tiff

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2004-07-15 15:52:20
109Hardware virtualization / Hardware-assisted virtualization / Virtualization / Hypervisor / X86 virtualization / Paravirtualization / Virtual private server / Xen / VirtualBox / System software / Software / Virtual machines

Towards Using a Trusted Computing Base for Security in Virtual Machines Belinda Marie Deci E00818003

Add to Reading List

Source URL: www.emich.edu

Language: English - Date: 2012-02-23 14:57:35
110Trusted Computer System Evaluation Criteria / Trusted computing / ITSEC / Trusted computing base / Common Criteria / Computer security / Security / National Security Agency

RELATING FUNCTIONALITY CLASS AND SECURITY SUB-PROFILE SPECIFICATIONS ABSTRACT

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-12 10:46:51
UPDATE