Trustworthy computing

Results: 188



#Item
1

Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2011-10-27 11:53:48
    2

    TGC 2011: 6th International Symposium on Trustworthy Global Computing Aachen, Germany, September 9-10, 2011 (co-located with CONCUR & QESTURL: http://www.di.unipi.it/TGC2011 — Contact: Object

    Add to Reading List

    Source URL: www.di.unipi.it

    Language: English - Date: 2011-07-14 12:56:26
      3

      Nexus: An Operating System for Trustworthy Computing Alan Shieh Dan Williams Kevin Walsh Emin Gün Sirer Fred B. Schneider Department of Computer Science Cornell University

      Add to Reading List

      Source URL: www.cs.cornell.edu

      - Date: 2009-12-11 23:31:04
        4

        Nexus: A New Operating System for Trustworthy Computing Alan Shieh Dan Williams

        Add to Reading List

        Source URL: www.cs.cornell.edu

        - Date: 2009-12-11 23:31:04
          5

          Nexus: An Operating System for Trustworthy Computing Alan Shieh Emin Gün Sirer Dan Williams

          Add to Reading List

          Source URL: www.cs.cornell.edu

          - Date: 2009-12-11 23:31:04
            6

            Wireless security with 802.1x and PEAP Steve Riley Senior Consultant, MCS Trustworthy Computing Services 13 JanuaryWireless LAN authentication

            Add to Reading List

            Source URL: blackhat.com

            - Date: 2015-05-28 15:51:53
              7

              Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

              Add to Reading List

              Source URL: www.sigops.org

              - Date: 2011-09-18 14:34:30
                8

                Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

                Add to Reading List

                Source URL: www.sigops.org

                - Date: 2011-09-20 03:37:00
                  9Software / Computing / Real-time computing / Worst-case execution time / Simulink / French Institute for Research in Computer Science and Automation / Xavier Leroy / AbsInt

                  Trust in programming tools: the formal verification of compilers and static analysers Xavier Leroy Inria Paris Verified trustworthy software systems, April 2016

                  Add to Reading List

                  Source URL: pauillac.inria.fr

                  Language: English - Date: 2016-04-05 14:57:15
                  10Computing / Software / Information science / Twitter / Social media / Web 2.0 / Social networking services / Social networks / Hashtag / TrustRank / Twitter usage / Twitter bomb

                  On the Wisdom of Experts vs. Crowds: Discovering Trustworthy Topical News in Microblogs Muhammad Bilal Zafar MPI-SWS, Germany Parantapa Bhattacharya

                  Add to Reading List

                  Source URL: www.mpi-sws.org

                  Language: English - Date: 2015-10-19 09:08:22
                  UPDATE