Trusted system

Results: 509



#Item
411Trusted Platform Module / Ring / Hypervisor / IOS jailbreaking / Trusted Computing Group / Embedded hypervisor / Computer security / System software / Trusted computing

Trusted Computing Overview Use Cases Neil Kittleson What is Trusted Computing?

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:32:03
412Firefighting in the United States / 9-1-1 / Public Health Information Network / Incident Command System / Health Alert Network / Dispatcher / Emergency / Triage / Enhanced 9-1-1 / Public safety / Management / Emergency management

Section 2 – Provision of Information to the Public Objective: The public has been trained to call[removed]when help is needed, whether the problem is small or large, urgent or not. The PSAP is a trusted source of informa

Add to Reading List

Source URL: www.nhtsa.gov

Language: English - Date: 2007-10-05 13:25:21
413Software / Archive formats / BagIt / Java platform / Workflow / National Digital Newspaper Program / ASP.NET / Manifest file / File system / Computing / Archival science / Digital libraries

In examining the reasons why more institutions do not have trusted digital repositories for their collections, one ends up loo

Add to Reading List

Source URL: www.digitalpreservation.gov

Language: English - Date: 2009-04-14 17:08:00
414Disaster preparedness / Firefighting in the United States / Humanitarian aid / Occupational safety and health / Incident Command System / Emergency management / Management / Public safety

The Basics Concept What is a VOST? Trusted agents organized and directed by Emergency Management agencies.

Add to Reading List

Source URL: sis.nlm.nih.gov

Language: English - Date: 2013-01-18 11:33:00
415Computing / Crime prevention / National security / Data security / Multilevel security / Trusted computing base / Trusted Computer System Evaluation Criteria / Network security / Access control / Computer security / Security / Computer network security

Network Security Reference Guide

Add to Reading List

Source URL: www.dss.mil

Language: English - Date: 2014-04-30 14:52:02
416Data / Computer file / Windows Explorer / File format / Binary file / Filename extension / Tar / File viewer / Image file formats / Computer file formats / Computing / System software

TRUSTED DOWNLOAD Background Scope NISPOM Requirements Definitions

Add to Reading List

Source URL: www.dss.mil

Language: English - Date: 2014-04-28 13:58:26
417Trusted Execution Technology / McAfee / Virtual appliance / Hypervisor / System software / Software / VMware

Trusted Geolocation in The Cloud Technical Demonstration NIST Interagency Report[removed]Trusted

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-01 09:17:43
418Computer security / Crime prevention / National security / Computer crimes / Key management / National Strategy for Trusted Identities in Cyberspace / United States Department of Homeland Security / Identity management system / Cyberspace / Security / Public safety / Computer network security

[removed]NTIA-SYN-CIIE-Comments

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-10-04 11:36:21
419Science / Museology / Knowledge representation / Open Archival Information System / Repository / Metadata / Preservation / Digital Repository Audit Method Based on Risk Assessment / Digital preservation / Archival science / Library science / Digital libraries

Catalogue of Criteria for Trusted Digital Repositories Version 1 (draft for public comment)

Add to Reading List

Source URL: files.d-nb.de

Language: English - Date: 2009-08-18 08:56:14
420National security / National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing / Mandatory access control / Trusted computing base / Clark–Wilson model / Ring / Capability-based security / Computer security / Security / Crime prevention

DOCID: ·[removed]A Stab at A2 Criteria (b)(3)-P.L[removed]and

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2012-01-04 11:57:17
UPDATE