Next-Generation Secure Computing Base

Results: 49



#Item
1Geography of California / Business / Microsoft / Central Valley / Davis /  California / University of California /  Davis / Kuali Foundation / Request for proposal / Next-Generation Secure Computing Base

ADMAN Board of Directors Meeting Minutes December 17, p.mRobert Mondavi Institute, Room 1207

Add to Reading List

Source URL: occr.ucdavis.edu

Language: English - Date: 2016-04-08 21:59:35
2Health informatics / Electronic health records / Health Insurance Portability and Accountability Act / Data protection / Protected health information / Medical privacy / Next-Generation Secure Computing Base / Privacy / Medical record / Information privacy / Health Information Technology for Economic and Clinical Health Act / National Provider Identifier

DOC Document

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2006-01-05 22:30:20
3Computer security / Computing / Trusted computing / Cryptography / Windows Vista / Trusted Computing Group / Next-Generation Secure Computing Base / Grid computing / Proxy server / Rootkit / Virtualization / Hardware virtualization

information security technical report–138 available at www.sciencedirect.com www.compseconline.com/publications/prodinf.htm

Add to Reading List

Source URL: ipads.se.sjtu.edu.cn

Language: English - Date: 2012-01-05 23:25:04
4Trusted computing / Hardware security module / Secure cryptoprocessor / Automated teller machine / EMV / Next-Generation Secure Computing Base / Smart card / Trusted Platform Module / Security of automated teller machines / Cryptography / Computer security / Espionage

CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. — Goldfinger

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 09:57:39
5Trusted computing / Microkernel / Security / Trusted computing base / Kernel / Trusted path / L4 microkernel family / Next-Generation Secure Computing Base / Ring / Computer security / Computer architecture / System software

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael Hohmuth

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:18
6Financial institutions / Institutional investors / Contract law / Palladium / Next-Generation Secure Computing Base / First Church of Christ /  Scientist / Insurance / Lease / Law / Private law / Matter

Using the Palladium TERMS AND CONDITIONS Revision Date: 5/8/12

Add to Reading List

Source URL: www.mypalladium.org

Language: English - Date: 2012-09-18 11:59:50
7Next-Generation Secure Computing Base / Trusted Execution Technology / Trusted Network Connect / Trusted Computing Group / Computer security / Trusted computing / Trusted Platform Module

Trusted Computing and Free Software RMLL 2009 – Nantes Frédéric Guihéry AMOSSYS July 9, 2009

Add to Reading List

Source URL: www.amossys.fr

Language: English - Date: 2012-07-25 04:35:25
8Central processing unit / Trusted computing / Booting / Ring / Operating system / Kernel / Next-Generation Secure Computing Base / CPU cache / BIOS / Computer architecture / Computing / System software

Certifying Program Execution with Secure Processors Benjie Chen Robert Morris MIT Laboratory for Computer Science {benjie,rtm}@lcs.mit.edu Abstract Cerium is a trusted computing architecture that protects

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2003-06-03 23:21:03
9Next-Generation Secure Computing Base / Secure Shell / Remote administration / Computer security / Trusted computing / System software

Certifying Program Execution with Secure Processors Benjie Chen Robert Morris Laboratory for Computer Science

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2003-05-28 11:51:35
10Disk encryption / Trusted Platform Module / Trusted Computing Group / Computer network security / Cryptographic software / BitLocker Drive Encryption / Trusted Network Connect / Next-Generation Secure Computing Base / Direct Anonymous Attestation / Computer security / Trusted computing / Cryptography

Trusted Platform Module (TPM)

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2009-03-28 00:28:27
UPDATE