Trusted computing base

Results: 152



#Item
81Cryptography / Business law / Copyright law / Trusted Platform Module / Trusted computing base / Ring / Vulnerability / Password / Trusted system / Computer security / Security / Trusted computing

Idea: Trusted Emergency Management Timothy E. Levin1 , Cynthia E. Irvine1 , Terry V. Benzel2 , Thuy D. Nguyen1 , Paul C. Clark1 , and Ganesha Bhaskara2 1 2

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2009-06-04 09:26:02
82National security / Evaluation / Computer network security / Trusted computing base / Multilevel security / National Information Assurance Partnership / Mandatory access control / Trusted Computer System Evaluation Criteria / Common Criteria / Computer security / Security / Crime prevention

Engineering Secure Systems Lessons Learned from Building a High-Assurance Crypto Gateway The construction of a complex secure system composed

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2012-10-30 13:53:03
83XTS-400 / Windows Server / Multilevel security / Multiple single-level / Mandatory access control / Client–server model / Security-Enhanced Linux / Trusted computing base / Server / Computer security / Computer network security / Evaluation

MYSEA: The Monterey Security Architecture Cynthia E. Irvine, Thuy D. Nguyen, David J. Shifflett, Timothy E. Levin, Jean Khosalim, Charles Prince, Paul C. Clark and Mark Gondree Department of Computer Science, Naval Postg

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2010-03-24 14:46:06
84Trusted Platform Module / Trusted Computing Group / Next-Generation Secure Computing Base / Trusted Execution Technology / TPM / Random oracle / Secure two-party computation / Direct Anonymous Attestation / Computer security / Trusted computing / Cryptography

Exploring Trusted Platform Module Capabilities: A Theoretical and Experimental Study

Add to Reading List

Source URL: nsl.cse.unt.edu

Language: English - Date: 2011-12-22 15:11:06
85Crime prevention / National security / Computer network security / Information security / Common Criteria / Trusted computing base / Trusted Computer System Evaluation Criteria / Security policy / Personal digital assistant / Security / Computer security / Public safety

Themes and Highlights of the New Security Paradigms Workshop 2000 Chair: Steven J. Greenwald Independent INFOSEC Consultant 2521 NE 135 Street

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
86Supercomputers / Computer memory / Direct memory access / Motherboard / Myrinet / Trusted computing base / Kernel / Ring / Device driver / Computing / Computer hardware / Computer networks

Security of High-Performance Messaging Layers on Programmable Network Interface Architectures Srigurunath Chakravarthi [removed] Department of Computer Science Mississippi State University

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
87Computer network security / Crime prevention / Electronic commerce / National security / Secure communication / Trusted system / Operating system / Trusted computing base / Vulnerability / Computer security / Security / Cyberwarfare

Proceedings of the Seminar on the DoD Computer Security Initiative Program, July 17-18, 1979, Gaithersburg, Maryland

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:26:10
88Cloud computing / Computer network security / Crime prevention / National security / Secure communication / Trusted computing base / Trusted Computing / Gemalto / Multilevel security / Security / Computer security / Computing

PDF Document

Add to Reading List

Source URL: www.celticplus.eu

Language: English - Date: 2014-04-27 08:27:30
89Virtual machines / Trusted computing / Programming language implementation / VM / Hypervisor / Operating system / Computing platform / Next-Generation Secure Computing Base / Microkernel / System software / Software / VMware

Terra: A Virtual Machine-Based Platform for Trusted Computing Tal Garfinkel Ben Pfaff Jim Chow Mendel Rosenblum

Add to Reading List

Source URL: benpfaff.org

Language: English - Date: 2014-11-24 21:25:49
90Evaluation / Trusted computing base / Microkernel / L4 microkernel family / Real-time operating systems / Gernot Heiser / Formal verification / Isabelle / Formal methods / Computer security / Computer architecture / Computing

Mathematically Verified Software Kernels: Raising the Bar for High Assurance Implementations Dr Daniel Potts, VP of Engineering, General Dynamics C4 Systems Rene Bourquin, Member Technical Staff, General Dynamics C4 Syst

Add to Reading List

Source URL: sel4.org

Language: English - Date: 2014-07-28 22:03:39
UPDATE