Trusted computing

Results: 881



#Item
851National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing / Trusted computing base / Multilevel security / Mandatory access control / Principle of least privilege / Covert channel / Secure Computing / Computer security / Software quality / Evaluation

Cost Profile of a Highly Assured, Secure Operating System Richard E. Smith Secure Computing Corporation

Add to Reading List

Source URL: www.cryptosmith.com

Language: English - Date: 2011-03-19 12:01:40
852Logic programming / Prolog / Definite clause grammar / Logic Programming Associates / Predicate / Occurs check / Append / Backtracking / Horn clause / Software engineering / Computing / Computer programming

Microcomputer PROLOG implementations: The state-of-the-art by HAL BERGHEL and RICHARD RANKIN

Add to Reading List

Source URL: www.customer_service.trusted.secure.server.bestandmostsecureonlinebankinamerica.myfavoritebank.com.berghel.com

Language: English - Date: 2010-09-17 13:36:44
853National security / Evaluation / Access control / Trusted Computer System Evaluation Criteria / Common Criteria / Information security / Discretionary access control / Protection Profile / Trusted computing base / Computer security / Security / Crime prevention

CONTROLLED ACCESS PROTECTION PROFILE Version 1.d

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2010-09-02 21:29:55
854Secure communication / Trusted computing / National security / Trusted system / Multics / Bell–LaPadula model / Trusted Computer System Evaluation Criteria / Operating system / Secure state / Computer security / Security / Computer network security

PDF Document

Add to Reading List

Source URL: www.acsac.org

Language: English - Date: 2005-11-21 16:32:53
855Computing / Cryptography / Business law / Copyright law / Next-Generation Secure Computing Base / Trusted Platform Module / Trusted system / X Window System / Microkernel / Computer security / Trusted computing / Software

PDF Document

Add to Reading List

Source URL: www.vivekhaldar.com

Language: English - Date: 2005-12-09 20:49:49
856Trusted Computing / Computer security / Cryptography / Trusted Computing Group

PDF Document

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2011-03-01 13:52:16
857Computer network security / Trusted Computing Group / Trusted Network Connect / IF-MAP / Trusted Platform Module / Interoperability / Hardware-based full disk encryption / Sun Microsystems / Cloud computing / Computer security / Trusted computing / Computing

PDF Document

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2011-01-24 12:08:23
858Trusted computing / Cryptography / Trusted Computing Group / Disk encryption / BIOS / Advanced Configuration and Power Interface / Trusted Platform Module / BitLocker Drive Encryption / Computer security / System software / Computing

PDF Document

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-04-08 17:47:54
859Trusted computing / Internet protocols / Data / Cryptographic protocols / Internet standards / Trusted Network Connect / IF-MAP / Transport Layer Security / Transmission Control Protocol / Computer security / Computing / Computer network security

TNC IF-M

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-05-18 00:18:12
860Theoretical computer science / Concurrent computing / Formal methods / L4 microkernel family / Formal verification / Microkernel / Isabelle / Trusted computing base / Kernel / Computer architecture / Computing / Software

PDF Document

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2009-08-05 10:48:36
UPDATE