Trusted Network Connect

Results: 26



#Item
1The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2012-08-29 15:32:53
2A finer grained Network Access Control using TrustView Security Architecture and Trusted Network Connect Architecture Chaitanya Vinay Hazarey CSCI 599tc Trusted Computing, Spring 2007

A finer grained Network Access Control using TrustView Security Architecture and Trusted Network Connect Architecture Chaitanya Vinay Hazarey CSCI 599tc Trusted Computing, Spring 2007

Add to Reading List

Source URL: hazarey.s3.amazonaws.com

Language: English - Date: 2012-04-12 21:35:06
    3ARCHITECT’S GUIDE: CYBERSECURITY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

    ARCHITECT’S GUIDE: CYBERSECURITY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

    Add to Reading List

    Source URL: www.trustedcomputinggroup.org

    Language: English - Date: 2013-12-06 18:21:27
    4

    PDF Document

    Add to Reading List

    Source URL: www.trustedcomputinggroup.org

    Language: English - Date: 2010-09-13 09:37:20
    5

    PDF Document

    Add to Reading List

    Source URL: www.trustedcomputinggroup.org

    Language: English - Date: 2010-09-13 09:37:20
    6ARCHITECT’S GUIDE: ICS SECURITY USING TNC TECHNOLOGY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

    ARCHITECT’S GUIDE: ICS SECURITY USING TNC TECHNOLOGY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

    Add to Reading List

    Source URL: www.trustedcomputinggroup.org

    Language: English - Date: 2013-11-06 16:49:30
    7Trusted Computing and Free Software RMLL 2009 – Nantes Frédéric Guihéry AMOSSYS  July 9, 2009

    Trusted Computing and Free Software RMLL 2009 – Nantes Frédéric Guihéry AMOSSYS July 9, 2009

    Add to Reading List

    Source URL: www.amossys.fr

    Language: English - Date: 2012-07-25 04:35:25
    8Trusted Platform Module (TPM)

    Trusted Platform Module (TPM)

    Add to Reading List

    Source URL: www.trustedcomputinggroup.org

    Language: English - Date: 2009-03-28 00:28:27
    9Change in Operational Model for OVAL  Over the past two years, the security automation leadership within the US Government (DHS, NIST, and NSA) has been developing a long-term strategy for security automation that focuse

    Change in Operational Model for OVAL Over the past two years, the security automation leadership within the US Government (DHS, NIST, and NSA) has been developing a long-term strategy for security automation that focuse

    Add to Reading List

    Source URL: oval.mitre.org

    Language: English - Date: 2014-05-14 17:18:06
    10The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

    The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

    Add to Reading List

    Source URL: www.strongswan.org

    Language: English - Date: 2012-08-29 15:32:53