Trusted system

Results: 509



#Item
491Common Criteria / Protection Profile / Security Target / Mandatory access control / Evaluation Assurance Level / Solaris / Trusted Computer System Evaluation Criteria / Trusted computing base / Sun Microsystems / Computer security / Evaluation / Solaris Trusted Extensions

PDF Document

Add to Reading List

Source URL: www.oracle.com

Language: English
492Windows Server / Antivirus software / Windows Vista / Cryptographic software / Windows NT / Microsoft Desktop Optimization Pack / BitLocker Drive Encryption / Microsoft SQL Server / Trusted Platform Module / Microsoft Windows / Software / System software

PDF Document

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2011-08-04 13:55:56
493Trusted computing base / Kernel / Separation kernel / Multilevel security / Operating system / Ring / Linux kernel / Unix / Security-Enhanced Linux / Computer architecture / Computer security / System software

PDF Document

Add to Reading List

Source URL: www.csl.sri.com

Language: English - Date: 2007-01-23 13:43:40
494Trusted computing base / Separation kernel / Kernel / Operating system / Multilevel security / Linux kernel / Ring / Unix / Server / Computer architecture / System software / Computer security

PDF Document

Add to Reading List

Source URL: www.csl.sri.com

Language: English - Date: 2004-05-25 18:32:46
495National security / Data security / Evaluation / Trusted Computer System Evaluation Criteria / Labeled Security Protection Profile / Mandatory access control / Information security / Common Criteria / Access control / Computer security / Security / Crime prevention

PDF Document

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2010-09-02 21:29:55
496National Security Agency / National security / Bell–LaPadula model / Mandatory access control / Discretionary access control / Trusted Computer System Evaluation Criteria / Trusted system / Access Control Matrix / Capability-based security / Computer security / Security / Access control

PDF Document

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 1999-04-01 11:22:57
497National security / Defence Research and Development Canada / Department of National Defence / National Security Agency / Multilevel security / Mandatory access control / Trusted Computer System Evaluation Criteria / Bell–LaPadula model / Information security / Computer security / Security / Crime prevention

PDF Document

Add to Reading List

Source URL: pubs.drdc.gc.ca

Language: English
498Computing / Trusted Network Connect / IF-MAP / Trusted Platform Module / Network Access Control / Trusted system / Virtual private network / Network security / Operating system / Computer security / Computer network security / Trusted computing

PDF Document

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2012-10-26 12:49:30
499Multilevel security / XTS-400 / Mandatory access control / National Information Assurance Partnership / Common Criteria / Protection Profile / Evaluation Assurance Level / Trusted operating system / Multiple Independent Levels of Security / Computer security / Evaluation / National Security Agency

PDF Document

Add to Reading List

Source URL: selfless-security.offthisweek.com

Language: English - Date: 2009-04-05 14:51:40
500Out-of-band management / Intel vPro / Trusted Execution Technology / Rootkit / Intel Active Management Technology / BIOS / Intel / Joanna Rutkowska / Hypervisor / System software / Computer security / Computing

PDF Document

Add to Reading List

Source URL: invisiblethingslab.com

Language: English - Date: 2009-07-30 17:12:04
UPDATE