Trusted system

Results: 509



#Item
41

Implementing an Untrusted Operating System on Trusted Hardware David Lie Dept. of Comp. and Elec. Eng. University of Toronto Toronto, ONT M2J 1A2

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2008-07-20 00:16:18
    42

    Your Trusted Partner in Health Care Annual Report to the Community BCBSF: Working Toward An Excellent, Efficient Health System

    Add to Reading List

    Source URL: www.nonprofithealthcare.org

    Language: English - Date: 2012-06-27 16:39:22
      43

      Erscheint in: Anna Kournikova Deleted By Memeright Trusted System – Kunst im Zeitalter des Geistigen Eigentums, Hartware MedienKunstVerein Dortmund, SeptemberInke Arns

      Add to Reading List

      Source URL: www.hmkv.de

      Language: German - Date: 2010-05-08 11:27:49
        44

        Trusted Gateway System™ Secure Multi-Directional Data Transfer. Features and Benefits n Included

        Add to Reading List

        Source URL: www.raytheon.com

        Language: English - Date: 2015-04-01 15:57:41
          45

          Trusted System Concepts Trusted System Concepts Marshall D. Abrams, Ph.D. Michael V. Joyce The MITRE Corporation

          Add to Reading List

          Source URL: www.acsac.org

          Language: English - Date: 1999-09-25 11:38:46
            46Cloud infrastructure / Trusted computing / Semiconductor companies / Server hardware / IBM cloud computing / Trusted Execution Technology / Intel / Trusted Computing Group / IBM System x / Cloud computing / Computing / Computer security

            Vendor Spotlight OCTOBER 2012 IBM Offers Cloud Security for a Smarter Planet

            Add to Reading List

            Source URL: www.intel.com

            Language: English - Date: 2015-01-09 15:28:45
            47Trusted computing / Virtual machines / Trusted Execution Technology / x86 architecture / Trusted Computing Group / Trusted Platform Module / Xen / Dell PowerEdge / Embedded hypervisor / System software / Computing / Software

            Cloud Design Uses Enomaly ECP* for Platform Security

            Add to Reading List

            Source URL: www.intel.com

            Language: English - Date: 2014-03-01 18:42:02
            48Technology / Trusted computing / Telemetry / Network architecture / Trusted Network Connect / IF-MAP / SCADA / Control system security / Trusted Computing Group / Computer security / Computer network security / Computing

            ARCHITECT’S GUIDE: ICS SECURITY USING TNC TECHNOLOGY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

            Add to Reading List

            Source URL: www.trustedcomputinggroup.org

            Language: English - Date: 2013-11-06 16:49:30
            49Computer network security / Internet Protocol / IPv6 / Trusted computing base / Computer network / Virtual private network / Kernel / Capability-based security / Ring / Computer security / Security / Computing

            An Overview of the Annex System D.A. Grove T.C. Murray C.A. Owen C.J. North J.A. Jones M.R. Beaumont

            Add to Reading List

            Source URL: www.acsac.org

            Language: English - Date: 2007-12-17 22:49:19
            50X86 architecture / IBM PC compatibles / Hardware virtualization / X86 virtualization / IOMMU / Trusted Execution Technology / DMA attack / MOV / Southbridge / System software / Computer hardware / Computing

            Another Way to Circumvent Intel® Trusted Execution Technology Tricking SENTER into misconfiguring VT-d via SINIT bug exploitation Rafal Wojtczuk Joanna Rutkowska

            Add to Reading List

            Source URL: invisiblethingslab.com

            Language: English - Date: 2009-12-21 13:05:46
            UPDATE