<--- Back to Details
First PageDocument Content
Mass surveillance / National Security Agency / United States government secrecy / Carnegie Mellon University / Computer security / SRI International / Trustworthy computing / Institute for Information Infrastructure Protection / Security / National security / Surveillance
Date: 2012-12-19 11:39:21
Mass surveillance
National Security Agency
United States government secrecy
Carnegie Mellon University
Computer security
SRI International
Trustworthy computing
Institute for Information Infrastructure Protection
Security
National security
Surveillance

Add to Reading List

Source URL: www.dhs.gov

Download Document from Source Website

File Size: 851,24 KB

Share Document on Facebook

Similar Documents

Logical Attestation: An Authorization Architecture for Trustworthy Computing Emin Gün Sirer Willem de Bruijn† Patrick Reynolds‡ Alan Shieh Kevin Walsh Dan Williams Fred B. Schneider Computer Science Department, Corn

DocID: 1tZzw - View Document

TGC 2011: 6th International Symposium on Trustworthy Global Computing Aachen, Germany, September 9-10, 2011 (co-located with CONCUR & QESTURL: http://www.di.unipi.it/TGC2011 — Contact: Object

DocID: 1tZic - View Document

Nexus: An Operating System for Trustworthy Computing Alan Shieh Dan Williams Kevin Walsh Emin Gün Sirer Fred B. Schneider Department of Computer Science Cornell University

DocID: 1tIiT - View Document

Nexus: A New Operating System for Trustworthy Computing Alan Shieh Dan Williams

DocID: 1tFvL - View Document

Nexus: An Operating System for Trustworthy Computing Alan Shieh Emin Gün Sirer Dan Williams

DocID: 1tCLK - View Document