Trusted computing

Results: 881



#Item
631CPU cache / Stack / Cache / Information flow / Pointer / Lookup table / Processor register / Program counter / Burroughs large systems / Computing / Central processing unit / Computer hardware

g-015 November 7, 2001 A Minimal Trusted Computing Base for Dynamically Ensuring Secure Information Flow

Add to Reading List

Source URL: www.ai.mit.edu

Language: English - Date: 2001-11-07 10:27:53
632Monolithic kernels / Kernel / Ring / Mandatory access control / Architecture of Windows NT / Operating system / Mach / Trusted computing base / Linux kernel / Computer architecture / System software / Software

Hardware Enforcement of Application Security Policies Using Tagged Memory Nickolai Zeldovich∗ , Hari Kannan† , Michael Dalton† , and Christos Kozyrakis† ∗ † MIT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
633Computer network security / APL programming language family / Trusted computing / Cryptography / Trustworthy computing / APL / Malware / Trusted Platform Module / Computer virus / Computing / Computer security / Security

Trustworthy Computing: Making Cyberspace Safe—Guest Editor’s Introduction

Add to Reading List

Source URL: techdigest.jhuapl.edu

Language: English - Date: 2013-09-27 10:05:08
634Error detection and correction / Cryptography / Computing / Security / Hash tree / Venti / Trusted Platform Module / Cache / Hash list / Hashing / Computer security / Cryptographic hash functions

Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srinivas Devadas Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology Cam

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
635Trusted Computing Group / Trusted Execution Technology / Ring / Firmware / Booting / Operating system / BitLocker Drive Encryption / Disk encryption / Computer security / Trusted computing / Trusted Platform Module

Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module Kathleen N. McGill n recent years, mobile devices have replaced desktop PCs as the computing platform of choice for many users. Unfortunately, mos

Add to Reading List

Source URL: techdigest.jhuapl.edu

Language: English - Date: 2013-09-26 17:27:04
636Computer crimes / Government / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Computing / Federal Information Security Management Act / National Institute of Standards and Technology / National Cybersecurity Center / National Strategy for Trusted Identities in Cyberspace / Cyberwarfare / Computer security / United States Department of Homeland Security

Testimony of Patrick D. Gallagher, Ph.D. Under Secretary of Commerce for Standards and Technology United States Department of Commerce

Add to Reading List

Source URL: www.appropriations.senate.gov

Language: English - Date: 2014-03-07 15:42:13
637Cloud infrastructure / Trusted computing / Eucalyptus / Virtual machine / VM / Hyper-V / Trusted Platform Module / Live migration / Cloud computing / System software / Software / Computing

Towards Trusted Cloud Computing Nuno Santos Krishna P. Gummadi Rodrigo Rodrigues

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2009-05-29 11:15:10
638Cryptography / Trusted Platform Module / Next-Generation Secure Computing Base / Cloud computing / Node / Eucalyptus / Public-key cryptography / Computer security / Trusted computing / Computing

Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services Nuno Santos, Rodrigo Rodrigues†, Krishna P. Gummadi, Stefan Saroiu‡ MPI-SWS, † CITI/Universidade Nova de Lisboa, ‡ Microsoft Research Abst

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2012-07-17 05:59:19
639Trusted Computing Group / Trusted Execution Technology / Ring / Firmware / Booting / Operating system / BitLocker Drive Encryption / Disk encryption / Computer security / Trusted computing / Trusted Platform Module

Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module Kathleen N. McGill n recent years, mobile devices have replaced desktop PCs as the computing platform of choice for many users. Unfortunately, mos

Add to Reading List

Source URL: www.jhuapl.edu

Language: English - Date: 2013-09-26 17:27:04
640Trusted computing / Key management / Trusted Platform Module / Cryptographic software / Trusted Computing Group / BitLocker Drive Encryption / Key size / Key / Crypt / Cryptography / Computer security / Disk encryption

Tech Digest Figure Template_1.5 column_01-06-12

Add to Reading List

Source URL: www.jhuapl.edu

Language: English - Date: 2013-09-26 17:29:37
UPDATE