Trusted computing base

Results: 152



#Item
121Business law / Copyright law / Cryptography / Eben Moglen / Next-Generation Secure Computing Base / Free Software Foundation / Trustworthy computing / Operating system / Microsoft / Computer security / Computing / Trusted computing

Free Software Matters: Untrustworthy Computing Eben Moglen∗ August 11, 2002 “Ideas are not often hard,” the great American judge Oliver Wendell

Add to Reading List

Source URL: moglen.law.columbia.edu

Language: English - Date: 2003-01-18 20:33:06
122National Security Agency / Trusted computing / Trusted computing base / Trusted Computer System Evaluation Criteria / Operating system / Mandatory access control / Kernel / Ring / Device driver / Computer security / Computer architecture / Computing

The Army Secure Operating System Neil A. Waldhart TRW Systems Integration Group

Add to Reading List

Source URL: www.cs.washington.edu

Language: English - Date: 2007-04-07 00:40:38
123National Security Agency / Trusted Computer System Evaluation Criteria / Secure communication / United States Department of Defense / Mandatory access control / Defense Technical Information Center / Trusted computing base / Penetration test / XTS-400 / Computer security / Computer network security / Trusted computing

PDF Document

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2011-05-14 21:01:17
124Trusted computing / Hardware security module / Secure cryptoprocessor / Automated teller machine / EMV / Next-Generation Secure Computing Base / Smart card / Trusted Platform Module / Security of automated teller machines / Cryptography / Computer security / Espionage

CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 09:57:39
125Business law / Copyright law / Cryptography / Eben Moglen / Next-Generation Secure Computing Base / Free Software Foundation / Trustworthy computing / Operating system / Microsoft / Computer security / Computing / Trusted computing

Free Software Matters: Untrustworthy Computing Eben Moglen∗ August 11, 2002 “Ideas are not often hard,” the great American judge Oliver Wendell

Add to Reading List

Source URL: emoglen.law.columbia.edu

Language: English - Date: 2003-01-18 20:33:06
126Microkernel / Kernel / NICTA / L4 / Gernot Heiser / IGUANA Computing / Computer architecture / L4 microkernel family / Trusted computing base

L4, Wombat, Skyeye and PLEB Ben Leslie   

Add to Reading List

Source URL: benno.id.au

Language: English - Date: 2006-01-23 15:13:54
127Kernel / Mach / IBM Workplace OS / Trusted computing base / Operating system / Ring / Operating system kernels / Gernot Heiser / TUD:OS / Computer architecture / L4 microkernel family / Microkernel

10 Years L4-Based Systems L4/Nizza Secure-System Architecture TU Dresden Operating

Add to Reading List

Source URL: www.sevecom.org

Language: English - Date: 2006-09-11 03:36:46
128Trusted computing / Cryptography / Disk encryption / Trusted Computing Group / Trusted Platform Module / BitLocker Drive Encryption / Trusted computing base / Computer security / Microsoft Windows / Security

Modeling TCG-based Secure Systems with Colored Petri Nets? Liang Gu† , Yao Guo†?? , Yanjiang Yang § , Feng Bao§ , Hong Mei† † Key Laboratory of High Confidence Software Technologies (Ministry of Education),

Add to Reading List

Source URL: sei.pku.edu.cn

Language: English - Date: 2010-11-12 00:51:14
129Trusted computing / Microkernel / Security / Trusted computing base / Kernel / Trusted path / L4 microkernel family / Next-Generation Secure Computing Base / Ring / Computer security / Computer architecture / System software

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components —

Add to Reading List

Source URL: os.inf.tu-dresden.de

Language: English - Date: 2004-08-02 05:13:46
130National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing / Trusted computing base / Discretionary access control / Access control / IBM AIX / TCB / Unix / Computer security / Security / Computer architecture

FINAL EVALUATION REPORT The IBM Corporation RS/6000 Distributed System

Add to Reading List

Source URL: www.ashtonlabs.com

Language: English - Date: 2008-08-20 17:11:02
UPDATE