Trusted system

Results: 509



#Item
221Software distribution / Software as a service / Software industry / Email / Computing / Centralized computing / Cloud computing

Software as a Service – Email Trusted, scalable, simplified email solution Stay connected Maintaining a trusted messaging system is a key function in any local or central Government IT

Add to Reading List

Source URL: www.scc.com

Language: English - Date: 2014-09-01 10:31:07
222Computer hardware / Intel Core / Intel / Xeon / Trusted Execution Technology / Hyper-threading / X86 virtualization / Intel vPro / Intel Active Management Technology / System software / Computing / X86 architecture

Intel Insights at SC11 Dr. Rajeeb Hazra General Manager Intel Technical Computing Group Illuminate Insight Solve Intel® Technical Computing Group

Add to Reading List

Source URL: newsroom.intel.com

Language: English - Date: 2015-01-29 22:15:41
223Embedded Linux / Smartphones / Android / PostgreSQL / Middleware / X Window System / Linux kernel / Security-Enhanced Linux / Software / Free software / System software

Middleware MAC for Android Stephen Smalley Trusted Systems Research National Security Agency

Add to Reading List

Source URL: kernsec.org

Language: English - Date: 2012-09-09 07:46:45
224Android / National Security Agency / Security-Enhanced Linux / Embedded Linux / Smartphones / Mandatory access control / FLASK / Type enforcement / Linux kernel / Software / System software / Computer security

Security Enhanced (SE) Android: Bringing Flexible MAC to Android Stephen Smalley and Robert Craig Trusted Systems Research National Security Agency {sds,rpcraig}@tycho.nsa.gov

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2013-04-23 16:59:42
225Embedded Linux / Smartphones / Android / Linux kernel / Sandbox / Lookout Mobile Security / X Window System / Security-Enhanced Linux / Software / System software / Computing

Security Enhanced (SE) Android: Bringing Flexible MAC to Android Stephen Smalley and Robert Craig Trusted Systems Research National Security Agency

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2013-04-23 16:59:54
226Android / Embedded Linux / Smartphones / Mandatory access control / Dalvik / Sandbox / Linux kernel / Privilege escalation / Operating system / Software / System software / Computing

The Case for Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2012-02-16 19:38:59
227Android / Smartphones / Embedded Linux / Cloud clients / Dalvik / Operating system / Mobile operating system / Sandbox / Linux kernel / Software / System software / Computing

Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2012-08-30 23:24:59
228Knowledge / Anomaly detection / Data mining / Data security / Autonomy / Predictive analytics / System / Information systems / Human factors / Cybernetics / Statistics / Science

Towards Modeling the Behavior of Autonomous Systems and Humans for Trusted Operations Weiqing Gu,1 Ranjeev Mittu,1 Julie Marble,2 Gavin Taylor,3 Ciara Sibley,1 Joseph Coyne,1 and W.F. Lawless4 1

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2014-06-26 16:32:41
229Computer hardware / Intel Core / Intel / Xeon / Trusted Execution Technology / Hyper-threading / X86 virtualization / Intel vPro / Intel Active Management Technology / System software / Computing / X86 architecture

Intel Insights at SC11 Dr. Rajeeb Hazra General Manager Intel Technical Computing Group Illuminate Insight Solve Intel® Technical Computing Group

Add to Reading List

Source URL: newsroom.intel.com

Language: English - Date: 2015-01-29 22:05:35
230Trusted computing / Cryptography / Trusted Platform Module / Cryptographic software / Direct Anonymous Attestation / Trusted Computing Group / Cloud computing / Virtual machine / VirtualBox / Software / System software / Computer security

The American University in Cairo School of Sciences and Engineering Using Trusted Platform Module for securing virtual environment access in Cloud

Add to Reading List

Source URL: dar.aucegypt.edu

Language: English - Date: 2015-01-15 17:00:14
UPDATE