Back to Results
First PageMeta Content
Cyberwarfare / Computer crimes / Computing / National security / Malware / International Multilateral Partnership Against Cyber Threats / Threat / Trustworthy computing / Computer insecurity / Security / Computer security / Computer network security


A Vision for Scalable Trustworthy Computing † L.M. Hively†, F.T. Sheldon† and A. Squicciarini* Oak Ridge National Laboratory, Oak Ridge, TN[removed] *
Add to Reading List

Document Date: 2010-09-23 11:11:55


Open Document

File Size: 1,03 MB

Share Result on Facebook

Company

Google / UT-Battelle LLC / Inter-Agency Working Group / A. Squicciarini* Oak Ridge National Laboratory / /

Continent

Asia / North America / Europe / /

Country

Estonia / United States / /

Currency

pence / USD / /

Event

Product Recall / Product Issues / /

Facility

Oak Ridge National laboratory / Pennsylvania State University / University Park / /

IndustryTerm

human body‟s management / homogeneous computing environments / software engineering / secure devices / immune systems / time-space-energy constraints / information processing / secure systems / individual processors / distributed processing / trustworthy computing / potential scalable trustworthy solutions / defense protocols / metrics/software testing/ management / open-source software use / hierarchical processing / web application exploits / biological systems / hierarchical hardware-software composition / software quality assurance / net processing power / trustworthy solutions / neuron-based processing / data-to-informationto-knowledge processing paradigm / hardware-software combinations / cellular processors / software life-cycle problems / real-time situational understanding / unhealthy food / software-patch cycle / near-real time / neocortical processing paradigm / trustworthy systems / carrier-mediated transporters / of-systems / energy consumption / organ systems / data processing / Web-based attacks / resourceagnostic cloud computing / natural/human systems / evolutionary computing / always-on processor / open-source applications / legacy systems / organized Internet exploits / real-time processing / insecure communications / information-processing perspective / image processing extracts / composite systems / artificial immune systems / computing / assurance systems / privilege management / Internet D8 / unreliable communications / hardware-software solutions / cyber systems / mission critical systems / bactericidal chemical / always-imperfect software / immuno-computing / software situational awareness / Internet map / /

Organization

Pentagon / Information Technology Advisory Committee / U.S. Department of Energy / Center for Disease Control / On Intelligence / Pennsylvania State University / National Intelligence / Muscular Movement / Congress / National Science and Technology Council / /

Person

Jennifer Aniston / Michael Näf / Jeffrey Hawkins / Dennis Blair / Aneesh Chopra / /

Position

CTO / Director of the Office / President / multiple feed-forward / feed-forward / /

Product

line of a song leads / /

ProvinceOrState

Tennessee / Georgia / /

Region

Middle East / Caribbean / Central Asia / /

Technology

massively parallel / cellular processors / always-on processor / smart card / operating system / image processing / operating systems / process control / information processor / President‟s Information Technology / apoptosis / pdf / encryption / Moving-target defense protocols / ten technologies / simulation / /

URL

http /

SocialTag