Trusted system

Results: 509



#Item
71Computer network security / Crime prevention / National security / Data security / Information security / Trusted computing base / Trusted Computer System Evaluation Criteria / Authorization / Vulnerability / Security / Computer security / Cyberwarfare

IJIS: 3–13 / Digital Object Identifier (DOIs102070100003 Computer security Carl E. Landwehr Mitretek Systems, 7525 Colshire Drive, McLean, VA 22102, USA Published online: 27 July 2001 –  Sprin

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:24
72Secure state / Multics / Ring / XTS-400 / Trusted system / Computer security / Security / Bell–LaPadula model

A Security Model for Military Message Systems CARL E. LANDWEHR, CONSTANCE L. HEITMEYER, and JOHN McLEAN Naval Research Laboratory Military systems that process classified information must operate in a secure manner; tha

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:59:56
73Virtual machines / Hypervisor / System Management Mode / Xen / Hyper-V / Ring / Trusted Execution Technology / Virtualization / IOMMU / System software / Software / VMware

HyperSentry: Enabling Stealthy In-context Measurement of ∗ Hypervisor Integrity Ahmed M. Azab Peng Ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:03
74Virtual machines / Cloud infrastructure / Xen / VMware / Hypervisor / Hyper-V / Platform Computing / X86 virtualization / Trusted Execution Technology / System software / Software / Cloud computing

BUILDING A PRIVATE CLOUD By Mark Black Jay Muelhoefer Parviz Peiravi Marco Righini

Add to Reading List

Source URL: media.cloudbook.net

Language: English - Date: 2013-04-15 05:40:52
75Trusted computing / Chain of trust / Kernel / Vulnerability / X Window System / DTrace / Field-programmable gate array / Ring / Trusted computing base / Computer security / Software / Computing

New Directions for Hardware-assisted Trusted Computing Policies (Position Paper) Sergey Bratus · Michael E. Locasto · Ashwin Ramaswamy · Sean W. Smith Dartmouth College

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-28 10:16:33
76Embedded Linux / Smartphones / Information flow / Information theory / Android / Apache Ant / Type system / Java / Static single assignment form / Software / Computing / Cross-platform software

SPARTA! Static Program Analysis for Reliable Trusted Apps http://types.cs.washington.edu/sparta/ VersionAugustDo not distribute.

Add to Reading List

Source URL: types.cs.washington.edu

Language: English - Date: 2013-08-02 13:59:39
77Trusted computing / Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Xen / Ring / Paravirtualization / Virtual machine / Rootkit / System software / Computer security / Software

TOCTOU, Traps, and Trusted Computing Sergey Bratus, Nihal D’Cunha, Evan Sparks, and Sean W. Smith Dartmouth College, Hanover, New Hampshire Abstract. The security of the standard TCG architecture depends on whether th

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2009-11-12 16:20:18
78National Security Agency / Data modeling / Decision theory / Security policy / Access control / Mandatory access control / Trusted Computer System Evaluation Criteria / EXPRESS / Security-Enhanced Linux / Computer security / Security / Policy

SPL: An access control language for security policies with complex constraints Carlos Ribeiro, Andr´e Z´uquete, Paulo Ferreira and Paulo Guedes IST / INESC Portugal E-mail: 

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:24:30
79Ethics / Crime prevention / National security / Evaluation / Electronic commerce / Integrity / Formal verification / Trusted Computer System Evaluation Criteria / Computer security / Security / Computer network security

ARSPA 2004 Preliminary Version Believing the Integrity of a System (Invited Talk) Simon N. Foley 1,2 Department of Computer Science

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2004-10-08 09:12:34
80Embedded Linux / Smartphones / Java platform / Android / Type system / Apache Ant / Java / Software / Computing / Cross-platform software

SPARTA! Static Program Analysis for Reliable Trusted Apps http://types.cs.washington.edu/sparta/ VersionDec 2014) Contents

Add to Reading List

Source URL: types.cs.washington.edu

Language: English - Date: 2014-12-29 14:17:49
UPDATE