Trusted system

Results: 509



#Item
61Software / Webroot Software / Avira / Sophos / Symantec / Trend Micro / Malware / Webroot Internet Security Complete / Webroot Internet Security Essentials / Antivirus software / Computer security / System software

WHITE PAPER > HOW RESELLERS CAN BECOME THE TRUSTED ADVISORS How Resellers Can Become the Trusted Advisors on Security Issues Boosting Customer Satisfaction and Loyalty with Superior Antivirus Protection

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2015-03-30 12:52:52
62Access control / Secure state / Trusted system / Multilevel security / Security / Computer security / Bell–LaPadula model

A Security Model for Military Message Systems: Retrospective Carl E. Landwehr Mitretek Systems, Inc. Constance L. Heitmeyer Naval Research

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:26
63Computer network security / Crime prevention / National security / Trusted Computer System Evaluation Criteria / Vulnerability / Threat / National Security Agency / Systems engineering process / Multilevel security / Computer security / Security / Cyberwarfare

NRL ReportAn Approach to Determining Computer Security Requirements for Navy Systems CARL E. LANDWEHR

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:02
64Crime prevention / National security / Common Criteria / Trusted Computer System Evaluation Criteria / Information security / Trusted computing base / Operating system / National Security Agency / Multilevel security / Computer security / Security / Evaluation

Chapter #N IMPROVING INFORMATION FLOW IN THE INFORMATION SECURITY MARKET DoD Experience and Future Directions Carl E. Landwehr University of Maryland

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:35
65Gernot Heiser / L4 microkernel family / Formal verification / Real-time operating systems / Kernel / Computer security / Integrity / Mach / Ring / Computer architecture / Trusted computing base / Microkernel

seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

Add to Reading List

Source URL: sel4.systems

Language: English - Date: 2014-09-23 22:58:53
66IEEE standards / IBM AIX / Unix / HP-UX / POSIX / Sun Microsystems / Solaris / Trusted operating system / Single UNIX Specification / Software / Computing / System software

MR. PAMU KUMAR SWAMY SUMMARY Over 20 years of experience in Information Technology Infrastructure management (IMS) as principal technical consultant for major commercial open systems and open source systems, data storage

Add to Reading List

Source URL: www.elucitsoftware.com

Language: English - Date: 2012-03-09 23:37:04
67National security / Public safety / Evaluation / Data security / Information security / Trusted Computer System Evaluation Criteria / Common Criteria / Protection Profile / Computer security / Security / Crime prevention

White paper presented to Workshop on Economics and Information Security, May 16-17, 2002, University of California at Berkeley Improving Information Flow in the Information Security Market Carl E. Landwehr Mitretek Syste

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2012-01-27 15:46:35
68National security / Public safety / National Security Agency / Multilevel security / Trusted computing base / Trusted Computer System Evaluation Criteria / Ring / Information security / Database security / Computer security / Security / Crime prevention

To Appear, IFIP World Congress ‘94 Link 3, Issue 5: How Much is Safety Worth? Sess. L-29.2, 1 Sept 94 Hidden safety requirements in large-scale systems Carl E. Landwehr

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:31:33
69Computer network security / Crime prevention / National security / Trusted Computer System Evaluation Criteria / Vulnerability / Threat / National Security Agency / Systems engineering process / Multilevel security / Computer security / Security / Cyberwarfare

NRL ReportAn Approach to Determining Computer Security Requirements for Navy Systems CARL E. LANDWEHR

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:00
UPDATE