Trusted system

Results: 509



#Item
471Public safety / Homeland Security Information Network / Regional Information Sharing Systems / Office of Operations Coordination / Homeland Security Act / Homeland security / Automated Trusted Information Exchange / U.S. Immigration and Customs Enforcement / Joint Regional Information Exchange System / United States Department of Homeland Security / National security / Government

GAO-07-822T Information Technology: Homeland Security Information Network Needs to Be Better Coordinated with Key State and Local Initiatives

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2007-05-10 13:59:32
472Steganography / Computer network security / NSD / Trusted Computer System Evaluation Criteria / Multilevel security / Bell–LaPadula model / Network security / Mediation / Overt channel / Computer security / Security / Covert channel

A SECURPI’Y POLICY AND FORMAL TOP LEVEL SPEC~CATiON FOR A MULTI-LEVEL SECURE LOCAL AREA NETWOIW (Extended Abstract)

Add to Reading List

Source URL: www.cs.washington.edu

Language: English - Date: 2007-04-07 00:44:02
473Trusted Execution Technology / Trusted computing base / Trusted Computer System Evaluation Criteria / TCB / Microkernel / Operating system / Secure environment / Next-Generation Secure Computing Base / Computer security / Trusted computing / Trusted Platform Module

Dynamic Root of Trust in Trusted Computing Cong Nie Helsinki University of Technology

Add to Reading List

Source URL: www.tml.tkk.fi

Language: English - Date: 2008-01-03 05:01:33
474National Security Agency / Security-Enhanced Linux / FLASK / Mandatory access control / Trusted Information Systems / Operating system / Linux / Type enforcement / Security-focused operating system / Computer security / Computing / System software

Integrating Flexible Support for Security  Policies into the Linux Operating System  Peter Loscocco, National Security Agency 

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2008-11-12 15:26:04
475National security / Identity management / Data security / Password / Trusted Computer System Evaluation Criteria / One-time password / Information security / Access control / Discretionary access control / Computer security / Security / Crime prevention

Computer Security Richard A. Kemmerer

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2002-09-25 14:57:37
476Trusted computing / Security / Rainbow Series / Multilevel security / Mandatory access control / Evaluation / Trusted system / Discretionary access control / Reference monitor / Computer security / National Security Agency / Trusted Computer System Evaluation Criteria

FOREWORD The National Computer Security Center is issuing A Guide to Understanding Security Modeling in Trusted Systems as part of the “Rainbow Series” of documents produced by our

Add to Reading List

Source URL: www.albany.edu

Language: English - Date: 2004-12-12 14:42:33
477Virtual machines / Hypervisor / Bell–LaPadula model / Hyper-V / VM / Xen / Biba Model / Trusted Computer System Evaluation Criteria / Covert channel / System software / Computing / Software

Secure Hypervisors Sebastian Vogl Fakult¨

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2009-10-05 06:46:18
478Virtual machines / Trusted computing / Programming language implementation / VM / Hypervisor / Operating system / Computing platform / Next-Generation Secure Computing Base / Microkernel / System software / Software / VMware

Terra: A Virtual Machine-Based Platform for Trusted Computing Tal Garfinkel  

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2003-08-13 12:51:07
479Science / Museology / Open Archival Information System / Repository / Preservation / Digital Repository Audit Method Based on Risk Assessment / Digital preservation / Archival science / Digital libraries / Library science

Catalogue of Criteria for Trusted Digital Repositories

Add to Reading List

Source URL: edoc.hu-berlin.de

Language: English - Date: 2009-10-31 22:42:30
480McAfee / Evaluation / FreeBSD / Trusted system / Common Criteria / Trusted operating system / Robert Watson / GEOM / Access control / Computer security / Security / Computing

[removed]TrustedBSD: Trusted Operating

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2006-12-09 06:53:06
UPDATE