Trusted system

Results: 509



#Item
101Central processing unit / Trusted computing / Booting / Ring / Operating system / Kernel / Next-Generation Secure Computing Base / CPU cache / BIOS / Computer architecture / Computing / System software

Certifying Program Execution with Secure Processors Benjie Chen Robert Morris MIT Laboratory for Computer Science {benjie,rtm}@lcs.mit.edu Abstract Cerium is a trusted computing architecture that protects

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2003-06-03 23:21:03
102Next-Generation Secure Computing Base / Secure Shell / Remote administration / Computer security / Trusted computing / System software

Certifying Program Execution with Secure Processors Benjie Chen Robert Morris Laboratory for Computer Science

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2003-05-28 11:51:35
103System software / Microsoft SharePoint / Portal software / Active Directory Federation Services / Security Assertion Markup Language / Trusted Platform Module / Software / Computer security / Content management systems

CASE STUDY: JW Secure and the United States Department of Defense Introduction Our expertise in building ultra-secure systems made JW Secure the right choice

Add to Reading List

Source URL: www.jwsecure.com

Language: English - Date: 2014-12-16 20:21:54
104Customs services / Authorized economic operator / Canada Border Services Agency / Trade facilitation / Supply chain security / Single-window system / World Customs Organization / International trade / Business / Supply chain management

PDF Document

Add to Reading List

Source URL: www.trusted-trade.net

Language: English - Date: 2011-01-06 05:47:28
105Computing / Unified Extensible Firmware Interface / System Management Mode / X86 virtualization / Rootkit / Trusted Execution Technology / Personal computer hardware / Virtual machine / Booting / System software / Software / BIOS

Into the Unknown: Assessing your BIOS Vulnerabilities Xeno Kovah Lead InfoSec Engineer MITRE Approved for Public Release; Distribution Unlimited. Case Number

Add to Reading List

Source URL: dl.mandiant.com

Language: English - Date: 2015-05-11 08:19:08
106Identifiers / Immune system / Immunology / Anatomy / Identification / GS1 / Allergy / Food allergy / Allergen / Barcodes / Medicine / Standards organizations

GS1 GoScan™ LEAP into the future of dietetics with trusted information Health professionals and consumers often have to rely on out-of-date and incomplete nutritional information found on labels, brochures, or sourced

Add to Reading List

Source URL: www.gs1au.org

Language: English - Date: 2013-08-26 21:04:45
107Money / Banking in Canada / Interac / Accounting software / Accountancy / Bookkeeping / Accounts payable / Business / Finance / Payment systems

Public Accounting System We understand that an accounting system is really all about: Better Decision Making As a trusted advisor, you must be able to provide your clients with the information that may be important to ma

Add to Reading List

Source URL: www.intersoftsystems.com

Language: English - Date: 2015-04-15 18:55:49
108BIOS / Trusted computing / Trusted Platform Module / Trusted Execution Technology / Disk encryption / Trusted Computing Group / BitLocker Drive Encryption / Unified Extensible Firmware Interface / System Management Mode / Computer security / System software / Computing

Problems with the Static Root of Trust for Measurement John Butterworth Corey Kallenberg Xeno Kovah Amy Herzog

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-07-31 03:56:11
109Health informatics / UpToDate / Seoul National University Hospital / Patient safety / Clinical decision support system / Seoul National University Bundang Hospital / Medicine / Health / Medical informatics

Case Study A Trusted Resource in the EHR UpToDate evidence-based clinical decision support in the clinical workflow: Seoul National University and Bundang Hospitals

Add to Reading List

Source URL: www.uptodate.com

Language: English - Date: 2014-08-15 12:21:28
110Crime prevention / National security / Data security / United States Agency for International Development / Information security / Trusted Computer System Evaluation Criteria / Vulnerability / Password / Access control / Security / Computer security / Public safety

Last RevisedFunctional SeriesManagement Services ChapterInformation Systems Security Table of Contents

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE