Trusted Information Systems

Results: 75



#Item
1Frederick M. AvolioFrederick Road Woodbine, MD5215 (mh)

Frederick M. AvolioFrederick Road Woodbine, MD5215 (mh)

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2010-05-14 09:24:10
2Thinking About Firewalls Marcus J. Ranum  Trusted Information Systems, Inc. Glenwood, Maryland Abstract

Thinking About Firewalls Marcus J. Ranum Trusted Information Systems, Inc. Glenwood, Maryland Abstract

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 17:42:39
3Trusted Computing Exemplar Project Cynthia E. Irvine, Timothy E. Levin, Thuy Nguyen, George W. Dinolt Center for Information Systems Security Studies and Research (CISR) Naval Postgraduate School The science and discipli

Trusted Computing Exemplar Project Cynthia E. Irvine, Timothy E. Levin, Thuy Nguyen, George W. Dinolt Center for Information Systems Security Studies and Research (CISR) Naval Postgraduate School The science and discipli

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2007-11-15 12:21:56
    4Proceedings of the 5th IEEE Systems, Man and Cybernetics Information Assurance Workshop, United States Military Academy, West Point, NY, 10–11 June 2004, ppThe Trusted Computing Exemplar Project Cynthia E. Ir

    Proceedings of the 5th IEEE Systems, Man and Cybernetics Information Assurance Workshop, United States Military Academy, West Point, NY, 10–11 June 2004, ppThe Trusted Computing Exemplar Project Cynthia E. Ir

    Add to Reading List

    Source URL: www.cisr.us

    Language: English - Date: 2007-11-15 12:21:11
      5Proceedings of the 5th IEEE Systems, Man and Cybernetics Information Assurance Workshop, United States Military Academy, West Point, NY, 10–11 June 2004, ppThe Trusted Computing Exemplar Project Cynthia E. Ir

      Proceedings of the 5th IEEE Systems, Man and Cybernetics Information Assurance Workshop, United States Military Academy, West Point, NY, 10–11 June 2004, ppThe Trusted Computing Exemplar Project Cynthia E. Ir

      Add to Reading List

      Source URL: www.cisr.us

      Language: English - Date: 2007-11-15 12:21:11
        6Towards Trusted Systems from the Ground Up Vivek Haldar Michael Franz  Information and Computer Science,

        Towards Trusted Systems from the Ground Up Vivek Haldar Michael Franz Information and Computer Science,

        Add to Reading List

        Source URL: www.vivekhaldar.com

        Language: English - Date: 2005-12-09 20:49:47
          7TOWARD A COMPREHENSIVE INFOSEC CERTIFICATION METHODOLOGY  Charles N. Payne, Judith N. Froscher and Carl E. Landwehr Center for High Assurance Computing Systems Naval Research Laboratory Washington, D.C–5337

          TOWARD A COMPREHENSIVE INFOSEC CERTIFICATION METHODOLOGY  Charles N. Payne, Judith N. Froscher and Carl E. Landwehr Center for High Assurance Computing Systems Naval Research Laboratory Washington, D.C–5337

          Add to Reading List

          Source URL: www.landwehr.org

          Language: English - Date: 2014-08-18 19:00:26
          8MR. PAMU KUMAR SWAMY SUMMARY Over 20 years of experience in Information Technology Infrastructure management (IMS) as principal technical consultant for major commercial open systems and open source systems, data storage

          MR. PAMU KUMAR SWAMY SUMMARY Over 20 years of experience in Information Technology Infrastructure management (IMS) as principal technical consultant for major commercial open systems and open source systems, data storage

          Add to Reading List

          Source URL: www.elucitsoftware.com

          Language: English - Date: 2012-03-09 23:37:04
          9To Appear, IFIP World Congress ‘94 Link 3, Issue 5: How Much is Safety Worth? Sess. L-29.2, 1 Sept 94 Hidden safety requirements in large-scale systems Carl E. Landwehr

          To Appear, IFIP World Congress ‘94 Link 3, Issue 5: How Much is Safety Worth? Sess. L-29.2, 1 Sept 94 Hidden safety requirements in large-scale systems Carl E. Landwehr

          Add to Reading List

          Source URL: www.landwehr.org

          Language: English - Date: 2014-08-18 19:31:33
          10Build and Operate a Trusted GIG

          Build and Operate a Trusted GIG

          Add to Reading List

          Source URL: iac.dtic.mil

          Language: English - Date: 2015-04-27 13:16:03