Trusted computing base

Results: 152



#Item
141National security / Evaluation / Access control / Trusted Computer System Evaluation Criteria / Common Criteria / Information security / Discretionary access control / Protection Profile / Trusted computing base / Computer security / Security / Crime prevention

CONTROLLED ACCESS PROTECTION PROFILE Version 1.d

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2010-09-02 21:29:55
142Computing / Cryptography / Business law / Copyright law / Next-Generation Secure Computing Base / Trusted Platform Module / Trusted system / X Window System / Microkernel / Computer security / Trusted computing / Software

PDF Document

Add to Reading List

Source URL: www.vivekhaldar.com

Language: English - Date: 2005-12-09 20:49:49
143Theoretical computer science / Concurrent computing / Formal methods / L4 microkernel family / Formal verification / Microkernel / Isabelle / Trusted computing base / Kernel / Computer architecture / Computing / Software

PDF Document

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2009-08-05 10:48:36
144Copyright law / Next-Generation Secure Computing Base / Trusted Platform Module / Digital rights management / Tamper resistance / Ringtone / Copy protection / Computer security / Trusted computing / Cryptography

PDF Document

Add to Reading List

Source URL: www.research.ibm.com

Language: English - Date: 2003-04-16 11:17:27
145National security / Evaluation / Access control / Trusted Computer System Evaluation Criteria / Common Criteria / Information security / Discretionary access control / Protection Profile / Trusted computing base / Computer security / Security / Crime prevention

PDF Document

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
146Common Criteria / Protection Profile / Security Target / Mandatory access control / Evaluation Assurance Level / Solaris / Trusted Computer System Evaluation Criteria / Trusted computing base / Sun Microsystems / Computer security / Evaluation / Solaris Trusted Extensions

PDF Document

Add to Reading List

Source URL: www.oracle.com

Language: English
147Trusted computing base / Kernel / Separation kernel / Multilevel security / Operating system / Ring / Linux kernel / Unix / Security-Enhanced Linux / Computer architecture / Computer security / System software

PDF Document

Add to Reading List

Source URL: www.csl.sri.com

Language: English - Date: 2007-01-23 13:43:40
148Trusted computing base / Separation kernel / Kernel / Operating system / Multilevel security / Linux kernel / Ring / Unix / Server / Computer architecture / System software / Computer security

PDF Document

Add to Reading List

Source URL: www.csl.sri.com

Language: English - Date: 2004-05-25 18:32:46
149National security / Computer network security / Secure communication / Trusted computing base / Reference monitor / Security policy / Protection mechanism / Kernel / Vulnerability / Computer security / Security / Crime prevention

PDF Document

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2001-06-25 19:24:15
150Computer-mediated communication / Trusted computing base / Mandatory access control / Email filtering / Simple Mail Transfer Protocol / Email / Computer security / Computing

PDF Document

Add to Reading List

Source URL: www.cryptosmith.com

Language: English - Date: 2011-03-19 12:01:40
UPDATE