Security kernel

Results: 400



#Item
301System software / FIPS 140-2 / Operating system / Kernel / FIPS 140 / IBM / X Window System / OSI model / Cryptography standards / Software / Computing

Chapter 2 Security Policy 2.1 Scope of Document This document presents the security policy for FIPS[removed]validation of the CP/Q++ software layer for Model 1-class devices in the IBM 4758 secure coprocessor family.

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
302SPARC T4 / Solaris / Oracle Database / FIPS 140-2 / ZFS / Linux kernel / Oracle Linux / UltraSPARC T1 / Software / Computing / Oracle Corporation

1D - Solaris Kernel Cryptographic Framework Hybrid FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-12 12:06:18
303Computer network security / Crime prevention / Electronic commerce / National security / Secure communication / Ring / Operating system / Kernel / Capability-based security / Computer security / Security / Computer architecture

Preliminary Notes on the Design of Secure Military Computer Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-15 16:05:56
304Cryptographic Module Validation Program / Computing / Blue Coat Systems / Cryptography / Loadable kernel module / Evaluation / Cryptography standards / Computer security / FIPS 140

Microsoft Word - TID[removed]140spxxxx.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-11-18 00:00:00
305Cryptography standards / Oracle Corporation / PCI Express / AES instruction set / Loadable kernel module / Solaris / Oracle Database / FIPS 140 / ZFS / Software / Computing / Computer architecture

1F - Solaris Kernel Cryptographic Framework Software FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-12 12:50:35
306Real-time operating systems / Kernel / Operating system / Linux kernel / Unix / Ring / Multilevel security / EROS / Computer architecture / Computer security / System software

Secure Minicomputer Operating System (KSOS) Executive Summary

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-15 14:54:31
307Windows Vista / Data Encryption Standard / Triple DES / Windows / Cryptographic hash function / Key / Encrypting File System / Microsoft CryptoAPI / Cryptography / Microsoft Windows / Cryptographic software

Operating System Microsoft Kernel Mode Cryptographic Module FIPS[removed]Documentation: Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
308Booting / Authentication / PKCS / Loadable kernel module / Cryptography / Cryptography standards / FIPS 140

CHR NON-PROPRIETARY SECURITY POLICY Date: June 23rd, 2011 Reference: CHR/LP51007/EN Version: 2.2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2011-07-06 09:53:00
309Computer network security / Computer security / Crime prevention / Electronic commerce / National security / Secure communication / Ring / Kernel / Linux kernel / Computer architecture / Security / Software

Subversion: The Neglected Aspect of Computer Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-15 15:42:11
310Cryptographic software / FIPS 140-2 / FIPS 140 / Windows Vista / Zeroisation / Microsoft CryptoAPI / Security and safety features new to Windows Vista / Cryptography / Cryptography standards / Computer security

Microsoft Word - 3e-010F Cryptographic Kernel Library Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-12-03 00:00:00
UPDATE