Trusted system

Results: 509



#Item
151EROS / Capability-based security / Kernel / Operating system / Principle of least privilege / KeyKOS / Trusted computing base / Persistence / Ring / Computer architecture / Computing / Computer security

focus building software securely EROS: A Principle-Driven Operating System from the

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:18
152Hyper-V / Windows Server / Hypervisor / Proxy server / VM / Trusted Computing / Embedded hypervisor / Virtual firewall / System software / Software / Computer networking

“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten Schwan Georgia Tech Information Security Center & Center for Expe

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-09 17:34:04
153Computer memory / Programming language implementation / Memory type range register / Trusted Execution Technology / CPU cache / Protected mode / Joanna Rutkowska / X86 / Computer architecture / Computing / System Management Mode

Attacking SMM Memory via Intel® CPU Cache Poisoning Rafal Wojtczuk [removed] Joanna Rutkowska [removed]

Add to Reading List

Source URL: invisiblethingslab.com

Language: English - Date: 2009-03-19 09:49:58
154Edelman / Top-level domain / MarkMonitor / Domain name system / Identifiers

Case Study: Public Relations MarkMonitor Delivers Trusted Domain Management for Edelman Executive Summary

Add to Reading List

Source URL: www.markmonitor.com

Language: English - Date: 2015-02-24 12:52:19
155Crime prevention / National security / Evaluation / Trusted Computer System Evaluation Criteria / Mandatory access control / ITSEC / Common Criteria / CTCPEC / Information security / Computer security / Security / Data security

"B IS FOR BUSINESS : MANDATORY SECURITY CRITERIA AND THE OECD GUIDELINES FOR INFORMATION SYSTEMS SECURITY" Professor William J Caelli Head School of Data Communications

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1996-10-28 00:00:00
156Roaming / RedCARE / GSM / Burglar alarm / Mobile Network Code / Technology / Mobile technology / Wireless

Redcare GSM Roaming Technical product information Redcare GSM Roaming protects customers with a grade 4 dual path alarm signalling system that uses BT’s trusted Redcare network. The dual path system uses both a phone l

Add to Reading List

Source URL: www.redcare.bt.com

Language: English - Date: 2015-01-09 08:10:14
157Security Target / Evaluation Assurance Level / Protection Profile / Trusted Computer System Evaluation Criteria / ITSEC / Cryptographic Module Testing Laboratory / Labeled Security Protection Profile / Computer security / Evaluation / Common Criteria

Common Criteria This brochure was produced by Syntegra on behalf of the Common Criteria Project Sponsoring Organisations

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
158Computer security / Time / Trusted timestamping / Symmetricom / Traceability / Calibration / Accuracy and precision / Statistics / Measurement / Thought

5-5 Development of the Trusted Time Stamping System IWAMA Tsukasa, KURIHARA Noriyuki, IMAE Michito, IMAMURA Kuniyasu, KOTAKE Noboru, GOTOH Tadahiro, SUZUYAMA Tomonari, and MORIKAWA Takao IT social infrastructures based o

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2014-01-20 00:16:34
159Software / Computing / Citrix Systems / Citrix XenApp / Xen / Virtual Desktop Extender / X1 Technologies / Remote desktop / System software / Remote administration software

X1 Search 8 Virtual Edition is Verified as Citrix Ready X1’s Lightning-Fast Search of Files & Emails in Virtual Desktop Environments is Trusted to Enhance Citrix Virtualization Infrastructure Solutions PASADENA, CALIF.

Add to Reading List

Source URL: www.x1.com

Language: English - Date: 2014-03-19 13:08:09
160L4 microkernel family / Gernot Heiser / Embedded systems / Microkernel / Open Kernel Labs / Mach / Kernel / Trusted computing base / Hypervisor / System software / Computer architecture / Computing

Introduction COMP9242 2008/S2 Week 1 Part 1 ©2008 Gernot Heiser UNSW/NICTA/OKL. Distributed under Creative Commons Attribution License

Add to Reading List

Source URL: www.ok-labs.com

Language: English - Date: 2009-10-01 17:42:24
UPDATE