Trusted computing

Results: 881



#Item
301Application programming interfaces / Remote desktop / Freedesktop.org / X Window System / Client–server model / Server / Operating system / X Window System core protocol / X Window System protocols and architecture / Software / System software / Computing

Submitted to the 2004 IEEE Symposium on Security and Privacy, Oakland, CA 2004 The EROS Trusted Window System SRL Technical Report SRL[removed]Jonathan S. Shapiro John Vanderburgh

Add to Reading List

Source URL: srl.cs.jhu.edu

Language: English - Date: 2007-09-20 09:41:43
302Evaluation Assurance Level / Protection Profile / Security Target / Trusted computing base / Trusted Computer System Evaluation Criteria / ITSEC / XTS-400 / Cimcor / Computer security / Evaluation / Common Criteria

Common Criteria Common Criteria for Information Technology Security Evaluation

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
303Akamai Technologies / Akamai Foundation / Content delivery network / Computing / Internet

AR_COVER.qxd[removed]:47 AM Page 4 The Trusted Choice for Online Business Annual Report 2004 AR_COVER.qxd[removed]:46 AM Page 1

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2006-09-21 21:38:53
304Crime prevention / National security / Data security / Information security / Security engineering / Vulnerability / Trusted computing base / Common Criteria / Managed security service / Security / Computer security / Public safety

July 2002 By Ed Gerck, Ph.D. IT Security Consultant IT Security: Closing the

Add to Reading List

Source URL: nma.com

Language: English - Date: 2002-08-16 21:45:08
305EROS / Capability-based security / Kernel / Operating system / Principle of least privilege / KeyKOS / Trusted computing base / Persistence / Ring / Computer architecture / Computing / Computer security

focus building software securely EROS: A Principle-Driven Operating System from the

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:18
306Hyper-V / Windows Server / Hypervisor / Proxy server / VM / Trusted Computing / Embedded hypervisor / Virtual firewall / System software / Software / Computer networking

“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten Schwan Georgia Tech Information Security Center & Center for Expe

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-09 17:34:04
307Computer memory / Programming language implementation / Memory type range register / Trusted Execution Technology / CPU cache / Protected mode / Joanna Rutkowska / X86 / Computer architecture / Computing / System Management Mode

Attacking SMM Memory via Intel® CPU Cache Poisoning Rafal Wojtczuk [removed] Joanna Rutkowska [removed]

Add to Reading List

Source URL: invisiblethingslab.com

Language: English - Date: 2009-03-19 09:49:58
308Programming paradigms / CapDesk / Principle of least privilege / Object-capability model / Trusted computing base / Kernel / Separation of concerns / Capability-based security / Abstraction / Security / Computer security / Access control

The Structure of Authority: Why Security Is not a Separable Concern Mark S. Miller1,2 , Bill Tulloh3, , and Jonathan S. Shapiro2 1 2 3

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:19
309Metadata / Trusted computing / Trusted computing base / XrML / Next-Generation Secure Computing Base / ODRL / PlayReady / The Right to Read / Trusted Platform Module / Computer security / Digital rights management / Copyright law

Key Challenges in DRM: An Industry Perspective Brian A. LaMacchia? Microsoft Corporation One Microsoft Way Redmond, WA[removed]USA

Add to Reading List

Source URL: www.farcaster.com

Language: English - Date: 2008-08-19 02:49:34
310Computing / Public safety / Distributed computing architecture / Mobile agent / Computer security / .mobi / Security guard / Proxy server / Computational trust / Security / Crime prevention / Computer network security

Mobile Agent security using Proxy-agents and Trusted domains ∗ Nikola Mitrovi´c

Add to Reading List

Source URL: webdiis.unizar.es

Language: English - Date: 2009-02-16 04:52:11
UPDATE