Trusted computing

Results: 881



#Item
281Computing / Internet privacy / Information privacy / Personally identifiable information / National Strategy for Trusted Identities in Cyberspace / Consumer privacy / Data breach / Medical privacy / FTC regulation of behavioral advertising / Privacy / Ethics / Security

CTO Corner September 2012 Striking a Balance between Privacy and Security Transformation Dan Schutzer, CTO, BITS

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-11-14 16:45:20
282Internet standards / Consortia / Distributed Management Task Force / Simple Network Management Protocol / XML / Computing / Network management / Internet protocols

Invited Presentations Keynote Mechanized Policy, Fact or Fancy? Joe Pato, Principal Scientist, Trusted E-Services Lab – HP Labs, Cambridge MA, USA Policy and the IETF – Theory and Practice

Add to Reading List

Source URL: www.policy-workshop.org

Language: English - Date: 2001-01-24 06:13:20
283Trusted Computing Group / Trusted Execution Technology / Open Vulnerability and Assessment Language / Total productive maintenance / Direct TPMS / Computer security / Trusted computing / Trusted Platform Module

Using the Trusted Platform Module to Enhance OVAL Driven Assessments

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2011-03-24 06:59:43
284Trusted Computing / Group signature / Digital signature / Anonymity / Public key certificate / Certificate authority / Digital credential / Cryptography / Public-key cryptography / Key management

figures/spendorsementRATE.eps

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-12-17 15:18:11
285Computer-mediated communication / Enterprise Vault / Microsoft Office / Email archiving / Symantec / Microsoft Exchange Server / Personal Storage Table / Gmail / X1 Technologies / Computing / Email / Software

Symantec Enterprise Vault™ for Microsoft® Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2011-08-01 12:48:16
286Computing / Folder / Portable Document Format

Procedure for Adding e-Memorial Form to Trusted List of Adobe Reader

Add to Reading List

Source URL: www.landreg.gov.hk

Language: English - Date: 2013-03-27 06:50:54
287Technology / Computing / Secure transmission / Internet / Biscom / Fax / Email

CUSTOMER SUCCESS STORY The Trusted Solution for Enterprise Secure File Transfer Zuckerman Spaeder LLP Zuckerman Spaeder Secures Employee Records with Biscom

Add to Reading List

Source URL: www.biscom.com

Language: English - Date: 2013-11-15 11:06:49
288Software engineering / Java / Computing / Cryptographic protocols / Computer programming

A Trusted Third-Party Computation Service Sameer Ajmani Robert Morris Barbara Liskov

Add to Reading List

Source URL: pmg.csail.mit.edu

Language: English - Date: 2002-06-04 13:27:28
289Security / Cryptographic protocols / Trusted computing / Internet protocols / Secure communication / Trusted Platform Module / Transport Layer Security / Cryptographic nonce / Direct Anonymous Attestation / Computer security / Cryptography / Computing

CS259 Project Report Security Analysis of Remote Attestation Lavina Jain ([removed]) Jayesh Vyas ([removed])

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2008-03-20 15:16:48
290Software bugs / X86 architecture / Trusted Execution Technology / Trusted computing / Rootkit / Malware / X86 virtualization / Buffer overflow / Intel / System software / Computer security / Computing

Mitigating Exploits, Rootkits and Advanced Persistent Threats David Durham, Senior Principal Engineer Intel Corporation

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-10 23:56:01
UPDATE