Trusted computing base

Results: 152



#Item
21Gernot Heiser / L4 microkernel family / Formal verification / Real-time operating systems / Kernel / Computer security / Integrity / Mach / Ring / Computer architecture / Trusted computing base / Microkernel

seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

Add to Reading List

Source URL: sel4.systems

Language: English - Date: 2014-09-23 22:58:53
22National security / Public safety / National Security Agency / Multilevel security / Trusted computing base / Trusted Computer System Evaluation Criteria / Ring / Information security / Database security / Computer security / Security / Crime prevention

To Appear, IFIP World Congress ‘94 Link 3, Issue 5: How Much is Safety Worth? Sess. L-29.2, 1 Sept 94 Hidden safety requirements in large-scale systems Carl E. Landwehr

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:31:33
23Computer network security / Crime prevention / National security / Data security / Information security / Trusted computing base / Trusted Computer System Evaluation Criteria / Authorization / Vulnerability / Security / Computer security / Cyberwarfare

IJIS: 3–13 / Digital Object Identifier (DOIs102070100003 Computer security Carl E. Landwehr Mitretek Systems, 7525 Colshire Drive, McLean, VA 22102, USA Published online: 27 July 2001 –  Sprin

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:24
24Trusted computing / Chain of trust / Kernel / Vulnerability / X Window System / DTrace / Field-programmable gate array / Ring / Trusted computing base / Computer security / Software / Computing

New Directions for Hardware-assisted Trusted Computing Policies (Position Paper) Sergey Bratus · Michael E. Locasto · Ashwin Ramaswamy · Sean W. Smith Dartmouth College

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-28 10:16:33
25L4 microkernel family / Microkernel / Embedded operating systems / Kernel / Gernot Heiser / Trusted computing base / Mach / EROS / Ring / Computer architecture / Computing / Real-time operating systems

L4Cars Kevin Elphinstone Gernot Heiser Ralf Huuck Stefan M. Petters Sergio Ruocco

Add to Reading List

Source URL: www.cse.unsw.edu.au

Language: English - Date: 2006-09-27 01:23:05
26Trusted computing / Microkernel / Security / Trusted computing base / Kernel / Trusted path / L4 microkernel family / Next-Generation Secure Computing Base / Ring / Computer security / Computer architecture / System software

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael Hohmuth

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:18
27Next-Generation Secure Computing Base / Trusted Execution Technology / Trusted Network Connect / Trusted Computing Group / Computer security / Trusted computing / Trusted Platform Module

Trusted Computing and Free Software RMLL 2009 – Nantes Frédéric Guihéry AMOSSYS July 9, 2009

Add to Reading List

Source URL: www.amossys.fr

Language: English - Date: 2012-07-25 04:35:25
28Central processing unit / Trusted computing / Booting / Ring / Operating system / Kernel / Next-Generation Secure Computing Base / CPU cache / BIOS / Computer architecture / Computing / System software

Certifying Program Execution with Secure Processors Benjie Chen Robert Morris MIT Laboratory for Computer Science {benjie,rtm}@lcs.mit.edu Abstract Cerium is a trusted computing architecture that protects

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2003-06-03 23:21:03
29Next-Generation Secure Computing Base / Secure Shell / Remote administration / Computer security / Trusted computing / System software

Certifying Program Execution with Secure Processors Benjie Chen Robert Morris Laboratory for Computer Science

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2003-05-28 11:51:35
30Disk encryption / Trusted Platform Module / Trusted Computing Group / Computer network security / Cryptographic software / BitLocker Drive Encryption / Trusted Network Connect / Next-Generation Secure Computing Base / Direct Anonymous Attestation / Computer security / Trusted computing / Cryptography

Trusted Platform Module (TPM)

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-03-28 00:28:27
UPDATE