Trusted system

Results: 509



#Item
431National security / K. A. Taipale / Crime prevention / Identity / Trusted system / Computer security / Privacy / Identity theft / Authentication / Security / Ethics / Public safety

Technical and Policy Challenges: Implications for Emerging Business Models K. A. Taipale Executive Director, Center for Advanced Studies Senior Fellow, World Policy Institute

Add to Reading List

Source URL: information-retrieval.info

Language: English - Date: 2005-11-05 22:46:33
432System software / Unified Extensible Firmware Interface / Computer architecture / Windows 8 / Trusted Platform Module / Personal computer hardware / Multi boot / BIOS / Booting / Computing

» The Linux Foundation Making UEFI Secure Boot Work With Open Platforms ..................

Add to Reading List

Source URL: feishare.com

Language: English - Date: 2012-02-22 02:06:29
433Crime prevention / National security / Trusted computing base / Information security / Cryptography / Actor model / System / Scientific method / Adversary / Security / Computer security / Science

NSF/IARPA/NSA Workshop on the Science of Security David Evans (PI), University of Virginia Workshop Report The NSF/IARPA/NSA Workshop on the Science of Security was held[removed]November 2008 in Berkeley, CA. It brought to

Add to Reading List

Source URL: sos.cs.virginia.edu

Language: English - Date: 2009-02-10 02:36:26
434Trusted Computer System Evaluation Criteria / Common Criteria / Kernel / Evaluation Assurance Level / Ring / Shared resource / XTS-400 / Mandatory access control / Computer security / Evaluation / Multilevel security

High Assurance MLS File Service

Add to Reading List

Source URL: www.aesec.com

Language: English - Date: 2007-02-21 11:28:55
435Remote desktop / Multilevel security / Thin client / Citrix Systems / NIPRNet / X Window System / Filesystem in Userspace / Trusted Computer System Evaluation Criteria / Multiple single-level / Software / Computer security / Computing

MLS Trusted Workstations for Rapid Deployment

Add to Reading List

Source URL: www.aesec.com

Language: English - Date: 2007-07-09 16:46:01
436Virtual machine / Virtual appliance / VMware ESX / VMware Infrastructure / Software / System software / VMware

MEDIA BACKGROUNDER VMware vShield TM 5: The Foundation for Trusted Cloud Infrastructures

Add to Reading List

Source URL: www.vmware.com

Language: English - Date: 2011-07-12 11:55:38
437Business law / Copyright law / Cryptography / Eben Moglen / Next-Generation Secure Computing Base / Free Software Foundation / Trustworthy computing / Operating system / Microsoft / Computer security / Computing / Trusted computing

Free Software Matters: Untrustworthy Computing Eben Moglen∗ August 11, 2002 “Ideas are not often hard,” the great American judge Oliver Wendell

Add to Reading List

Source URL: moglen.law.columbia.edu

Language: English - Date: 2003-01-18 20:33:06
438National Security Agency / Trusted computing / Trusted computing base / Trusted Computer System Evaluation Criteria / Operating system / Mandatory access control / Kernel / Ring / Device driver / Computer security / Computer architecture / Computing

The Army Secure Operating System Neil A. Waldhart TRW Systems Integration Group

Add to Reading List

Source URL: www.cs.washington.edu

Language: English - Date: 2007-04-07 00:40:38
439National Security Agency / Trusted Computer System Evaluation Criteria / Secure communication / United States Department of Defense / Mandatory access control / Defense Technical Information Center / Trusted computing base / Penetration test / XTS-400 / Computer security / Computer network security / Trusted computing

PDF Document

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2011-05-14 21:01:17
440Crime prevention / Data security / Bell–LaPadula model / Multilevel security / Mandatory access control / Trusted system / Information security / Classified information / Security policy / Computer security / Security / National security

CHAPTER 8 Multilevel Security Most high assurance work has been done in the area of kinetic devices and infernal machines that are controlled by stupid robots. As

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:30:52
UPDATE