Trusted operating system

Results: 85



#Item
1Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan  Developers seek to seamlessly integrate cyber

Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan Developers seek to seamlessly integrate cyber

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 15:07:52
2Microsoft Word - Weber_Weber_Virtualisation_English

Microsoft Word - Weber_Weber_Virtualisation_English

Add to Reading List

Source URL: www.itas.kit.edu

Language: English - Date: 2013-09-06 09:56:55
3Analysis of a Measured Launch

Analysis of a Measured Launch

Add to Reading List

Source URL: evenmere.org

Language: English - Date: 2008-06-23 13:59:25
4Implementing an Untrusted Operating System on Trusted Hardware David Lie Dept. of Comp. and Elec. Eng. University of Toronto Toronto, ONT M2J 1A2

Implementing an Untrusted Operating System on Trusted Hardware David Lie Dept. of Comp. and Elec. Eng. University of Toronto Toronto, ONT M2J 1A2

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2008-07-20 00:16:18
    5Naval Research Laboratory Washington, DC 20375*5000 NRL ReportA Framework for Evaluating Computer Architectures to

    Naval Research Laboratory Washington, DC 20375*5000 NRL ReportA Framework for Evaluating Computer Architectures to

    Add to Reading List

    Source URL: www.landwehr.org

    Language: English - Date: 2014-08-18 19:00:23
    6rim  NRL Report 8806 :f. rr

    rim NRL Report 8806 :f. rr

    Add to Reading List

    Source URL: www.landwehr.org

    Language: English - Date: 2014-08-18 18:59:49
    7Chapter #N IMPROVING INFORMATION FLOW IN THE INFORMATION SECURITY MARKET DoD Experience and Future Directions Carl E. Landwehr University of Maryland

    Chapter #N IMPROVING INFORMATION FLOW IN THE INFORMATION SECURITY MARKET DoD Experience and Future Directions Carl E. Landwehr University of Maryland

    Add to Reading List

    Source URL: www.landwehr.org

    Language: English - Date: 2014-08-18 19:01:35
    8seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

    seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

    Add to Reading List

    Source URL: sel4.systems

    Language: English - Date: 2014-09-23 22:58:53
    9MR. PAMU KUMAR SWAMY SUMMARY Over 20 years of experience in Information Technology Infrastructure management (IMS) as principal technical consultant for major commercial open systems and open source systems, data storage

    MR. PAMU KUMAR SWAMY SUMMARY Over 20 years of experience in Information Technology Infrastructure management (IMS) as principal technical consultant for major commercial open systems and open source systems, data storage

    Add to Reading List

    Source URL: www.elucitsoftware.com

    Language: English - Date: 2012-03-09 23:37:04