Security kernel

Results: 400



#Item
51From: Andrew Lewman, Executive Director To: the tor community Date: April 10, 2011 This report documents progress in January 2011.

From: Andrew Lewman, Executive Director To: the tor community Date: April 10, 2011 This report documents progress in January 2011.

Add to Reading List

Source URL: archive.torproject.org

Language: English - Date: 2011-09-15 09:57:03
52What is a Security Flaw?  Colin Percival   Colin Percival

What is a Security Flaw? Colin Percival Colin Percival

Add to Reading List

Source URL: www.daemonology.net

Language: English - Date: 2006-05-14 06:23:45
53A Security Enforcement Kernel for OpenFlow Networks Phillip Porras† Seungwon Shin‡ Vinod Yegneswaran† Martin Fong† Mabry Tyson† Guofei Gu‡ †  SRI International

A Security Enforcement Kernel for OpenFlow Networks Phillip Porras† Seungwon Shin‡ Vinod Yegneswaran† Martin Fong† Mabry Tyson† Guofei Gu‡ † SRI International

Add to Reading List

Source URL: www.openflowsec.org

Language: English - Date: 2013-10-15 15:03:15
54From: Andrew Lewman, Executive Director To: the tor community Date: May 7, 2011 This report documents progress in April 2011.

From: Andrew Lewman, Executive Director To: the tor community Date: May 7, 2011 This report documents progress in April 2011.

Add to Reading List

Source URL: archive.torproject.org

Language: English - Date: 2011-09-15 09:57:02
55Security	
  as	
  an	
  App	
  and	
   Security	
  as	
  a	
  Service:	
  	
   New	
  Killer	
  Applica6ons	
  for	
   So9ware	
  Defined	
  Networking?	
   Guofei	
  Gu	
   SUCCESS	
  Lab	
  

Security  as  an  App  and   Security  as  a  Service:     New  Killer  Applica6ons  for   So9ware  Defined  Networking?   Guofei  Gu   SUCCESS  Lab  

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2012-12-15 13:47:45
56

PDF Document

Add to Reading List

Source URL: swa.omg.org

Language: English - Date: 2006-12-14 08:55:42
57

PDF Document

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2014-10-09 10:44:05
58Microsoft Word - Trusting_Developers_Whitepaper_cc-3.doc

Microsoft Word - Trusting_Developers_Whitepaper_cc-3.doc

Add to Reading List

Source URL: atsec.com

Language: English - Date: 2010-08-10 10:53:40
59Microsoft Word - HP_RHEL4_security_target-v2.4.doc

Microsoft Word - HP_RHEL4_security_target-v2.4.doc

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
60System design issues • Systems often have many goals: - Performance, reliability, availability, consistency, scalability, security, versatility, modularity/simplicity  • Designers face trade-offs:

System design issues • Systems often have many goals: - Performance, reliability, availability, consistency, scalability, security, versatility, modularity/simplicity • Designers face trade-offs:

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2006-12-07 12:00:26