Trusted computing base

Results: 152



#Item
1Computer security / Cyberwarfare / Security / Cryptography / Antivirus software / Computer network security / Secure communication / Malware / Internet security / Vulnerability / Computer virus / Trusted computing base

The next step in IT security after Snowden Norbert Pohlmann Institute for Internet Security - if(is), Westphalian University of Applied Sciences Gelsenkirchen Neidenburger Str. 43, 45877 Gelsenkirchen, Germany

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-20 08:00:14
2Computer security / System software / Software / Trusted computing base / Mandatory access control / Security-Enhanced Linux / Kernel / Policy Monitoring / System call / XTS-400

The Case for Abstracting Security Policies   

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-04-13 14:58:02
3Security / Computer security / Prevention / Data security / Crime prevention / Cryptography / National security / Vulnerability / Information security / Attack / Trusted computing base / Software security assurance

Security Watch Rebecca T. Mercuri Computer Security: Quality Rather than Quantity

Add to Reading List

Source URL: www.notablesoftware.com

Language: English - Date: 2007-02-28 16:29:24
4Computer security / Security / Cryptography / Trusted computing / Computer network security / Secure communication / National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing base / Common Criteria / TCB / United States Department of Homeland Security

æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
5Computer security / Security / Cryptography / Trusted computing / Data security / Computer network security / Trusted Computer System Evaluation Criteria / Trusted system / Guard / Trusted computing base / Common Criteria / Blacker

COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:30
6Computer security / Security / Computer access control / Computer network security / Access control / Identity management / Cryptography / Authentication / Password / Trusted computing base / User / Multilevel security

Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2000-11-10 16:38:10
7Computer security / Computing / Trusted computing / Cryptography / Windows Vista / Trusted Computing Group / Next-Generation Secure Computing Base / Grid computing / Proxy server / Rootkit / Virtualization / Hardware virtualization

information security technical report–138 available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htm

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-01-05 23:25:04
8Computer security / Computer access control / Information theory / Access control / Mandatory access control / BellLaPadula model / Trusted Computing / Trusted computing base / Principle of least privilege / Information flow / Security kernel

A Security Domain Model for Implementing Trusted Subject Behaviors Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Timothy Levin  Naval Postgraduate School, Computer Science Department, 1411 Cunningham Rd., Monterey, Ca

Add to Reading List

Source URL: cisr.nps.edu

Language: English - Date: 2008-08-18 13:41:12
9Computer security / Computing / Trusted computing / Cryptography / Trusted Execution Technology / X86 architecture / Trusted Platform Module / Monitor / Futures and promises / Trusted computing base / Polymerase chain reaction / Thread

A Logic of Secure Systems and its Application to Trusted Computing Anupam Datta Jason Franklin Deepak Garg

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2009-06-02 14:26:22
10

TSAFE: Building a Trusted Computing Base for Air Traffic Control Software by Gregory D. Dennis Bachelor of Science in Computer Science and Engineering

Add to Reading List

Source URL: sdg.csail.mit.edu

Language: English - Date: 2014-05-07 00:00:59
    UPDATE