Trusted computing base

Results: 152



#Item
111ITSEC / Trusted Computer System Evaluation Criteria / Protection Profile / Security Target / Common Criteria / Trusted computing base / Vulnerability / Covert channel / Labeled Security Protection Profile / Computer security / Evaluation / CTCPEC

FOUNDATIONS FOR THE HARMONIZATION OF INFORMATION TECHNOLOGY SECURITY STANDARDS Item:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-11 15:45:42
112CTCPEC / Protection Profile / Security Target / Trusted Computer System Evaluation Criteria / Trusted computing base / Common Criteria / Labeled Security Protection Profile / Computer security / Evaluation / ITSEC

FOUNDATIONS FOR THE HARMONIZATION OF INFORMATION TECHNOLOGY SECURITY STANDARDS Item:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-11 15:42:29
113Central processing unit / Physical Unclonable Function / Randomness / Trusted computing / Parallel computing / Ring / Memory management unit / Kernel / Next-Generation Secure Computing Base / Computing / Computer architecture / Computer hardware

Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions G. Edward Suh, Charles W. O’Donnell, Ishan Sachdev, and Srinivas Devadas Computer Science and Artificial Intelligence

Add to Reading List

Source URL: csg.csail.mit.edu

Language: English - Date: 2005-04-24 19:19:10
114National security / Evaluation / Trusted computing base / Trusted system / Operating system / Protection mechanism / Multilevel security / XTS-400 / Computer security / Security / Crime prevention

Proposed Technical Evaluation for Trusted Computer Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-15 15:50:40
115Computing / Crime prevention / National security / Data security / Multilevel security / Trusted computing base / Trusted Computer System Evaluation Criteria / Network security / Access control / Computer security / Security / Computer network security

Network Security Reference Guide

Add to Reading List

Source URL: www.dss.mil

Language: English - Date: 2014-04-30 14:52:02
116National security / National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing / Mandatory access control / Trusted computing base / Clark–Wilson model / Ring / Capability-based security / Computer security / Security / Crime prevention

DOCID: ·[removed]A Stab at A2 Criteria (b)(3)-P.L[removed]and

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2012-01-04 11:57:17
117Applied mathematics / Formal methods / Inter-process communication / Microkernel / Trusted computing base / Formal verification / Kernel / Remote procedure call / Software verification / Computer architecture / Computing / Theoretical computer science

S¯adhan¯a Vol. 34, Part 1, February 2009, pp. 145–191. © Printed in India Proving the correctness of client/server software EYAD ALKASSAR, SEBASTIAN BOGAN and WOLFGANG J PAUL Computer Science Department, Saarland U

Add to Reading List

Source URL: www.ias.ac.in

Language: English - Date: 2009-02-20 06:03:15
118Computer network security / Trusted Computer System Evaluation Criteria / Trusted computing / Authentication / Trusted computing base / Trusted system / Information security / Password / Trusted path / Security / Computer security / Access control

NCSC-TG-017 Library No[removed],479 Version 1 FOREWORD A Guide to Understanding Identification and Authentication in Trusted Systems

Add to Reading List

Source URL: www.csirt.org

Language: English - Date: 2011-07-04 18:31:58
119Network architecture / Internet Key Exchange / IPsec / StrongSwan / Cryptographic nonce / Trusted computing base / Cryptographic protocols / Data / Information

IKEv2 Separation: Extraction of security critical components into a Trusted Computing Base (TCB) Reto Bürki, Adrian-Ken Rüegsegger

Add to Reading List

Source URL: www.codelabs.ch

Language: English - Date: 2013-02-04 11:05:01
120Crime prevention / National security / Trusted computing base / Information security / Cryptography / Actor model / System / Scientific method / Adversary / Security / Computer security / Science

NSF/IARPA/NSA Workshop on the Science of Security David Evans (PI), University of Virginia Workshop Report The NSF/IARPA/NSA Workshop on the Science of Security was held[removed]November 2008 in Berkeley, CA. It brought to

Add to Reading List

Source URL: sos.cs.virginia.edu

Language: English - Date: 2009-02-10 02:36:26
UPDATE