Trusted system

Results: 509



#Item
141Cryptography / Central processing unit / Ring / Hypervisor / Trusted Execution Technology / Malware / Smartphone / Tamper resistance / Integrity / System software / Computer security / Security

Mobile Hardware Security Vikas Chandra and Rob Aitken ARM R&D Hot Chips, August 2014

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-10 23:55:59
142Cryptography / Trusted computing / Unified Extensible Firmware Interface / Trusted Execution Technology / Trusted Platform Module / Trusted computing base / Side channel attack / Hypervisor / Tamper resistance / Computer security / Security / System software

SECURE SYSTEMS DESIGN LEENDERT VAN DOORN CORPORATE FELLOW [removed] 1

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-10 23:56:00
143Linux kernel / Booting / Software / Unified Extensible Firmware Interface / Vmlinux / Loadable kernel module / Linux / Trusted Platform Module / Linux startup process / BIOS / System software / Computer architecture

Integrity Protection Solutions for Embedded Systems Dmitry Kasatkin Samsung Open Source Group Samsung Research UK, Finland branch FOSDEM 2014

Add to Reading List

Source URL: archive.fosdem.org

Language: English - Date: 2014-10-24 07:45:54
144Trusted computing base / Ring / Rootkit / Operating system / Virtualization / Multilevel security / XTS-400 / Computer security / Security / Trusted computing

Managing Multiple Perspectives on Trust Dr. Clifford Neuman Information Sciences Institute University of Southern California [removed] Trusted computing provides methods for

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-13 22:59:50
145Embedded system / Physical Unclonable Function / Trusted Computing / Key generation / Cyberwarfare / Computer security / Electronic engineering / SiliconBlue Technologies / Secure cryptoprocessor / Cryptography / Key management / Field-programmable gate array

1 Hardware/Software Security Support R. R. Brooks, Associate Professor S. T. Sander, Assistant professor Holcombe Department of Electrical and Computer Engineering

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-04-09 15:36:30
146Internet governance / Internet in the United States / .net / ICANN / .org / Internet / Generic top-level domains / Domain name system

IETF[removed]The Internet Corporation for Assigned Names and Numbers .org Reassignment—RFP Response 29 August 2002 Engagement: $29,000 * 11

Add to Reading List

Source URL: trusted.resource.org

Language: English - Date: 2002-08-29 19:28:07
147Computer network security / Virtualization / Operating system / Hypervisor / Computer security / Server / Distributed computing / Multilevel security / Active Directory / System software / Computing / Security

Trusted Passages: Managing Distributed Trust Needs of Emerging Applications Mustaque Ahamad, Martim Carbone, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne, Karsten Schwan and Ramesh Viswanath School of Computer S

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-23 15:32:15
148

デジタル著作権管理(DRM) における信託システムの研究:制度方式によるデジタル権利マネジメント The Institutional Approach for Digital Rights Management (DRM) and Trusted System Ori

Add to Reading List

Source URL: www.bekkoame.ne.jp

Language: Japanese - Date: 2001-08-03 22:32:41
    149Application programming interfaces / Remote desktop / Freedesktop.org / X Window System / Client–server model / Server / Operating system / X Window System core protocol / X Window System protocols and architecture / Software / System software / Computing

    Submitted to the 2004 IEEE Symposium on Security and Privacy, Oakland, CA 2004 The EROS Trusted Window System SRL Technical Report SRL[removed]Jonathan S. Shapiro John Vanderburgh

    Add to Reading List

    Source URL: srl.cs.jhu.edu

    Language: English - Date: 2007-09-20 09:41:43
    150Evaluation Assurance Level / Protection Profile / Security Target / Trusted computing base / Trusted Computer System Evaluation Criteria / ITSEC / XTS-400 / Cimcor / Computer security / Evaluation / Common Criteria

    Common Criteria Common Criteria for Information Technology Security Evaluation

    Add to Reading List

    Source URL: www.niap-ccevs.org

    Language: English - Date: 2009-10-08 10:40:04
    UPDATE