Trusted Computing

Results: 881



#Item
861Copyright law / Next-Generation Secure Computing Base / Trusted Platform Module / Digital rights management / Tamper resistance / Ringtone / Copy protection / Computer security / Trusted computing / Cryptography

PDF Document

Add to Reading List

Source URL: www.research.ibm.com

Language: English - Date: 2003-04-16 11:17:27
862National security / Evaluation / Access control / Trusted Computer System Evaluation Criteria / Common Criteria / Information security / Discretionary access control / Protection Profile / Trusted computing base / Computer security / Security / Crime prevention

PDF Document

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
863Common Criteria / Protection Profile / Security Target / Mandatory access control / Evaluation Assurance Level / Solaris / Trusted Computer System Evaluation Criteria / Trusted computing base / Sun Microsystems / Computer security / Evaluation / Solaris Trusted Extensions

PDF Document

Add to Reading List

Source URL: www.oracle.com

Language: English
864Serial Digital Video Out / Centrino / PCI Express / X86 virtualization / Intel / Conventional PCI / Trusted Execution Technology / Nvidia Ion / Intel vPro / Computer hardware / Computing / Computer buses

PDF Document

Add to Reading List

Source URL: developer.intel.com

Language: English - Date: 2009-05-29 13:02:37
865Serial Digital Video Out / Centrino / PCI Express / X86 virtualization / Intel / Conventional PCI / Trusted Execution Technology / Nvidia Ion / Intel vPro / Computer hardware / Computing / Computer buses

PDF Document

Add to Reading List

Source URL: www.intel.com

Language: English - Date: 2009-05-29 13:02:37
866Trusted computing base / Kernel / Separation kernel / Multilevel security / Operating system / Ring / Linux kernel / Unix / Security-Enhanced Linux / Computer architecture / Computer security / System software

PDF Document

Add to Reading List

Source URL: www.csl.sri.com

Language: English - Date: 2007-01-23 13:43:40
867Trusted computing base / Separation kernel / Kernel / Operating system / Multilevel security / Linux kernel / Ring / Unix / Server / Computer architecture / System software / Computer security

PDF Document

Add to Reading List

Source URL: www.csl.sri.com

Language: English - Date: 2004-05-25 18:32:46
868National security / Computer network security / Secure communication / Trusted computing base / Reference monitor / Security policy / Protection mechanism / Kernel / Vulnerability / Computer security / Security / Crime prevention

PDF Document

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2001-06-25 19:24:15
869Computing / Trusted Network Connect / IF-MAP / Trusted Platform Module / Network Access Control / Trusted system / Virtual private network / Network security / Operating system / Computer security / Computer network security / Trusted computing

PDF Document

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2012-10-26 12:49:30
870Out-of-band management / Intel vPro / Trusted Execution Technology / Rootkit / Intel Active Management Technology / BIOS / Intel / Joanna Rutkowska / Hypervisor / System software / Computer security / Computing

PDF Document

Add to Reading List

Source URL: invisiblethingslab.com

Language: English - Date: 2009-07-30 17:12:04
UPDATE