Back to Results
First PageMeta Content
National security / Access control / Computer network security / Trusted computing base / Password / Information security / Authentication / User / Authorization / Security / Computer security / Crime prevention


Microsoft Word - 31-Paper-Security in the real world.doc
Add to Reading List

Document Date: 2006-01-30 14:52:56


Open Document

File Size: 150,79 KB

Share Result on Facebook

Company

Intel / Microsoft / Handout 31 / /

Country

Columbia / /

/

Event

Product Issues / /

IndustryTerm

cryptographic protocols / computer systems / Internet-wide end-to-end authentication / project web page / Internet services / telephone / secure computer systems / little technology / security products / individual web servers / real world systems / software developers / local systems / trusted computing base / finance / later auditor / encrypted channel protocol / deployed computer systems / advertising plans / web caches / a lot of software / system software / Internet user / web services security / basic tool / fact web servers / legacy hardware / /

OperatingSystem

Unix / Unix system / Microsoft Windows / /

Person

Transmit Sink / Bill Gates / Do / Bruce Schneier / /

Position

guard / access control model Information Reference monitor Send Principal Source Guard / manager / operation Reference monitor Object Source Request Guard / administrator / domain controller / Butler / auditor / controller / /

Product

Spectra / security / /

ProgrammingLanguage

SQL / Java / /

Technology

encryption / server farm / virtual machine / cryptography / LAN / encrypted channel protocol / public key / flow control / Java / firewall / Unix system / smart card / private key / antivirus software / operating system / mobile device / SSL / TCP/IP / access control list / /

SocialTag