Trusted Execution Technology

Results: 107



#Item
11Trusted computing / Virtual machines / Trusted Execution Technology / x86 architecture / Trusted Computing Group / Trusted Platform Module / Xen / Dell PowerEdge / Embedded hypervisor / System software / Computing / Software

Cloud Design Uses Enomaly ECP* for Platform Security

Add to Reading List

Source URL: www.intel.com

Language: English - Date: 2014-03-01 18:42:02
12X86 architecture / IBM PC compatibles / Hardware virtualization / X86 virtualization / IOMMU / Trusted Execution Technology / DMA attack / MOV / Southbridge / System software / Computer hardware / Computing

Another Way to Circumvent Intel® Trusted Execution Technology Tricking SENTER into misconfiguring VT-d via SINIT bug exploitation Rafal Wojtczuk Joanna Rutkowska

Add to Reading List

Source URL: invisiblethingslab.com

Language: English - Date: 2009-12-21 13:05:46
13Virtual machines / Hypervisor / System Management Mode / Xen / Hyper-V / Ring / Trusted Execution Technology / Virtualization / IOMMU / System software / Software / VMware

HyperSentry: Enabling Stealthy In-context Measurement of ∗ Hypervisor Integrity Ahmed M. Azab Peng Ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:03
14Virtual machines / Cloud infrastructure / Xen / VMware / Hypervisor / Hyper-V / Platform Computing / X86 virtualization / Trusted Execution Technology / System software / Software / Cloud computing

BUILDING A PRIVATE CLOUD By Mark Black Jay Muelhoefer Parviz Peiravi Marco Righini

Add to Reading List

Source URL: media.cloudbook.net

Language: English - Date: 2013-04-15 05:40:52
15Trusted computing / Trusted Platform Module / Trusted Computing Group / Trusted Execution Technology / Xen / Ring / Paravirtualization / Virtual machine / Rootkit / System software / Computer security / Software

TOCTOU, Traps, and Trusted Computing Sergey Bratus, Nihal D’Cunha, Evan Sparks, and Sean W. Smith Dartmouth College, Hanover, New Hampshire Abstract. The security of the standard TCG architecture depends on whether th

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2009-11-12 16:20:18
16Certificate authority / Peer-to-peer / Revocation list / Man-in-the-middle attack / Public key certificate / Public key infrastructure / Trusted Computing Group / Trusted Computing / Trusted Execution Technology / Cryptography / Public-key cryptography / Key management

Int. J. Inf. SecurDOIs10207x S P E C I A L I S S U E PA P E R Gabriel Vanrenen · Sean Smith · John Marchesini

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:23:27
17Trusted computing / Solaris Containers / Solaris / Trusted Platform Module / Trusted Execution Technology / DTrace / Virtual machine / Operating system / Ring / System software / Software / Computer security

Trusted Virtual Containers on Demand Katelin A. Bailey † ∗

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-11-08 12:53:06
18Computing / Cloud computing / Intel vPro / Trusted computing / Trusted Execution Technology / Trusted Platform Module

Trusted Compute Pools Feature in oVirt Oct 22, 2013 Gang Wei, Haitao Shan,

Add to Reading List

Source URL: kvm.et.redhat.com

Language: English - Date: 2013-11-03 05:32:36
19F-Secure / Trusted Execution Technology / Computer network security / Computer security / Trusted computing / Antivirus software

PDF Document

Add to Reading List

Source URL: www.securesystems.com.au

Language: English - Date: 2012-10-17 00:57:31
20Digital rights management / Cryptography / GlobalPlatform / Trusted Execution Technology / Tamper resistance / Data security / PlayReady / OMA DRM / Marlin / Computer security / Trusted computing / Copyright law

㏾㜷⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰⌦㬰〰㈰⌦㬰〰㌰⌦㬱〰㔰

Add to Reading List

Source URL: www.insidesecure.com

Language: English
UPDATE