Trusted computing base

Results: 152



#Item
61Trusted computing / Next-Generation Secure Computing Base / Trusted computing base / Trusted Platform Module / Microkernel / Trustworthy computing / Kernel / Ring / Virtual machine / Computer security / Computing / Security

Nexus: A New Operating System for Trustworthy Computing Alan Shieh Dan Williams

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-11-12 14:33:40
62Computer network security / Fred B. Schneider / Year of birth missing / Kernel / Trusted computing base / Linux kernel / Operating system / Protection mechanism / Policy / Computer security / Computing / Security

LNCS[removed]Lifting Reference Monitors from the Kernel

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-12 23:57:02
63Ethics / Next-Generation Secure Computing Base / Digital rights management / Trusted Platform Module / Information Rights Management / Z / Privacy / Digital rights / Trusted Computing Group / Computer security / Trusted computing / Copyright law

Microsoft PowerPoint - Mason Trusted Computing & Integrity of Govt-held Info.ppt

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 01:39:58
64Principle of least privilege / Trusted computing base / Ring / Institute of Electrical and Electronics Engineers / Privilege / Computing / Security / Computer security / Information theory

Least Privilege Least Privilege and More With new methods for enforcing security policies comes the opportunity to formulate application-specific policies. But

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-08-21 11:09:48
65Trusted computing / Identity management / Cryptography / Procfs / Unix / Next-Generation Secure Computing Base / Kernel / Nexus / Trusted Platform Module / Computer architecture / Software / System software

Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2011-09-24 15:57:36
66National security / Access control / Computer network security / Trusted computing base / Password / Information security / Authentication / User / Authorization / Security / Computer security / Crime prevention

Microsoft Word - 31-Paper-Security in the real world.doc

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2004-04-30 02:34:25
67X86 architecture / Assembly languages / Models of computation / X86 assembly language / Trusted computing base / Memory protection / X86 / GNU Compiler Collection / State / Software / Computing / Programming language implementation

SASI Enforcement of Security Policies: A Retrospective∗ ´ Ulfar Erlingsson Fred B. Schneider

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 20:34:42
68Computing / Access control / Kernel / Access control list / Principle of least privilege / Trusted computing base / Linux kernel / File system API / File system / Software / Computer security / Security

Costs of Security in the PFS File System∗ Kevin Walsh Department of Mathematics and Computer Science College of the Holy Cross [removed] Fred B. Schneider

Add to Reading List

Source URL: ecommons.library.cornell.edu

Language: English - Date: 2012-07-26 01:01:29
69Trusted computing base / Principal / Authorization / Authentication / Security / Computer security / Computer network security

Authentication in Distributed Systems: Theory and Practice BUTLER LAMPSON, MARTÍN ABADI, MICHAEL BURROWS, and EDWARD WOBBER Digital Equipment Corporation

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 1996-05-11 01:53:14
70Crime prevention / Computer security / Computer network security / Trusted computing base / Password / Information security / Multilevel security / Physical security / Vulnerability / Security / Public safety / National security

Microsoft Word - Lampson - Security paper for IEEE Computer.doc

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2004-03-01 01:00:42
UPDATE