Trusted system

Results: 509



#Item
381Computer network security / Trusted computing base / Operating system / Server / Trusted Computing / Kernel / Ring / XTS-400 / Security-Enhanced Linux / Computer security / Computer architecture / Security

/tardir/tiffs/a408173.tiff

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2004-07-15 16:23:12
382Access control / Computer security / Identity management / File system / Authorization / Tar / Trusted Computing / Internet privacy / Tag / Computing / System software / Information

Toward strong, usable access control for shared distributed data Michelle L. Mazurek, Yuan Liang, William Melicher, Manya Sleeper, Lujo Bauer, Gregory R. Ganger, Nitin Gupta, and Michael K. Reiter* Carnegie Mellon Univer

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2014-02-11 18:31:55
383Windows Server / Hypervisor / Ring / System software / Software / Hyper-V

Enhancing Datacenter Security and Scalability with Trusted End Host Monitors

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2010-03-02 15:13:45
384Trusted computing base / Mandatory access control / Trusted Computing / Microkernel / Ring / Kernel / Operating system / Trustworthy computing / Security kernel / Computer security / Security / Computing

/tardir/tiffs/a408429.tiff

Add to Reading List

Source URL: edocs.nps.edu

Language: English - Date: 2004-07-15 15:52:20
385Hardware virtualization / Hardware-assisted virtualization / Virtualization / Hypervisor / X86 virtualization / Paravirtualization / Virtual private server / Xen / VirtualBox / System software / Software / Virtual machines

Towards Using a Trusted Computing Base for Security in Virtual Machines Belinda Marie Deci E00818003

Add to Reading List

Source URL: www.emich.edu

Language: English - Date: 2012-02-23 14:57:35
386Computer security / ESET NOD32 / ESET / Malware / Spyware / Avira / Panda Pro / Antivirus software / System software / Software

Stay a Safe Distance from Internet Threats For all your activities, rely on ESET NOD32® technology trusted by millions of users to keep them safe.

Add to Reading List

Source URL: static2.esetstatic.com

Language: English - Date: 2013-12-03 07:30:34
387Access control / Information security / National security / Role-based access control / Security controls / Password / Database security / Trusted Computer System Evaluation Criteria / Security / Computer security / Data security

Control Family & Class

Add to Reading List

Source URL: www.cms.gov

Language: English - Date: 2013-11-20 12:11:50
388Computer security / ESET NOD32 / ESET / Malware / Spyware / Avira / Panda Pro / Antivirus software / System software / Software

Stay a Safe Distance from Internet Threats For all your activities, rely on ESET NOD32® technology trusted by millions of users to keep them safe.

Add to Reading List

Source URL: static3.esetstatic.com

Language: English - Date: 2013-12-03 07:30:34
389Antivirus software / Microsoft Forefront / Windows Server / Microsoft SharePoint / Azure Services Platform / Microsoft Security Essentials / Microsoft Online Services / Microsoft Office / Computer security / Software / Computing / System software

Microsoft technology solutions for cybersecurity For every phase of this security management life cycle, Microsoft provides trusted advice and technology solutions that play a critical role in helping to ensure the safet

Add to Reading List

Source URL: fedstelework.com

Language: English - Date: 2010-09-22 09:57:08
390Trusted Computer System Evaluation Criteria / Trusted computing / ITSEC / Trusted computing base / Common Criteria / Computer security / Security / National Security Agency

RELATING FUNCTIONALITY CLASS AND SECURITY SUB-PROFILE SPECIFICATIONS ABSTRACT

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-12 10:46:51
UPDATE