Trusted computing

Results: 881



#Item
831National Security Agency / Security-Enhanced Linux / FLASK / Mandatory access control / Trusted Information Systems / Operating system / Linux / Type enforcement / Security-focused operating system / Computer security / Computing / System software

Integrating Flexible Support for Security  Policies into the Linux Operating System  Peter Loscocco, National Security Agency 

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2008-11-12 15:26:04
832Disk encryption / Malware / Trusted Platform Module / Cryptographic software / Trusted Execution Technology / BitLocker Drive Encryption / Rootkit / Computer worm / Computer security / Trusted computing / Cryptography

Cloaking Malware with the Trusted Platform Module Alan M. Dunn

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2011-06-21 00:49:25
833Trusted computing / Security / Rainbow Series / Multilevel security / Mandatory access control / Evaluation / Trusted system / Discretionary access control / Reference monitor / Computer security / National Security Agency / Trusted Computer System Evaluation Criteria

FOREWORD The National Computer Security Center is issuing A Guide to Understanding Security Modeling in Trusted Systems as part of the “Rainbow Series” of documents produced by our

Add to Reading List

Source URL: www.albany.edu

Language: English - Date: 2004-12-12 14:42:33
834Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / StrongSwan / Rapperswil / Next-Generation Secure Computing Base / Computer security / Trusted computing / Cryptography

A Root of Trust for Measurement

Add to Reading List

Source URL: security.hsr.ch

Language: English - Date: 2011-06-19 04:27:15
835Virtual machines / Hypervisor / Bell–LaPadula model / Hyper-V / VM / Xen / Biba Model / Trusted Computer System Evaluation Criteria / Covert channel / System software / Computing / Software

Secure Hypervisors Sebastian Vogl Fakult¨

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2009-10-05 06:46:18
836Cryptography / Trusted Computing / BIOS / Law / Computing / Booting / Digital rights management / Easter egg / Copyright law / Computer security / Business law

Authenticated Booting, Remote Attestation, Sealed Memory

Add to Reading List

Source URL: os.inf.tu-dresden.de

Language: English - Date: 2008-04-16 04:31:12
837Virtual machines / Trusted computing / Programming language implementation / VM / Hypervisor / Operating system / Computing platform / Next-Generation Secure Computing Base / Microkernel / System software / Software / VMware

Terra: A Virtual Machine-Based Platform for Trusted Computing Tal Garfinkel  

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2003-08-13 12:51:07
838Disk encryption / Windows Vista / Cryptographic software / Trusted computing / BitLocker Drive Encryption / Windows Server / Trusted Platform Module / Trusted Computing Group / Smart card / Microsoft Windows / Computer security / Computing

Penetration Testing Windows Vista BitLocker Drive Encryption

Add to Reading List

Source URL: www.secguru.com

Language: English - Date: 2006-09-25 10:42:17
839Computer network security / Trusted Computing Group / Password / Trusted Computing / Security token / Digital rights management / Malware / Next-Generation Secure Computing Base / Computer security / Copyright law / Security

The Need for TCPA David Safford, IBM Research, October, 2002

Add to Reading List

Source URL: www.research.ibm.com

Language: English - Date: 2003-04-16 11:17:28
840McAfee / Evaluation / FreeBSD / Trusted system / Common Criteria / Trusted operating system / Robert Watson / GEOM / Access control / Computer security / Security / Computing

[removed]TrustedBSD: Trusted Operating

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2006-12-09 06:53:06
UPDATE