Trusted Information Systems

Results: 75



#Item
1Computing / Computer security / Software engineering / Computer network security / Cyberwarfare / Data security / Firewall / Network management / Trusted Information Systems / APL / Guard / Malware

Frederick M. AvolioFrederick Road Woodbine, MD5215 (mh)

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2010-05-14 09:24:10
2Computer network security / Computing / Computer security / Cyberwarfare / Bastion host / Firewall / Dual-homed / Router / Guard / Subnetwork / Gateway / Distributed firewall

Thinking About Firewalls Marcus J. Ranum Trusted Information Systems, Inc. Glenwood, Maryland Abstract

Add to Reading List

Source URL: www.avolio.com

Language: English - Date: 2007-12-29 17:42:39
3

Trusted Computing Exemplar Project Cynthia E. Irvine, Timothy E. Levin, Thuy Nguyen, George W. Dinolt Center for Information Systems Security Studies and Research (CISR) Naval Postgraduate School The science and discipli

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2007-11-15 12:21:56
    4

    Proceedings of the 5th IEEE Systems, Man and Cybernetics Information Assurance Workshop, United States Military Academy, West Point, NY, 10ā€“11 June 2004, ppThe Trusted Computing Exemplar Project Cynthia E. Ir

    Add to Reading List

    Source URL: www.cisr.us

    Language: English - Date: 2007-11-15 12:21:11
      5

      Proceedings of the 5th IEEE Systems, Man and Cybernetics Information Assurance Workshop, United States Military Academy, West Point, NY, 10ā€“11 June 2004, ppThe Trusted Computing Exemplar Project Cynthia E. Ir

      Add to Reading List

      Source URL: www.cisr.us

      Language: English - Date: 2007-11-15 12:21:11
        6

        Towards Trusted Systems from the Ground Up Vivek Haldar Michael Franz Information and Computer Science,

        Add to Reading List

        Source URL: www.vivekhaldar.com

        Language: English - Date: 2005-12-09 20:49:47
          7Crime prevention / National security / Trusted Computer System Evaluation Criteria / Trusted computing base / Vulnerability / Information security / Trusted system / Common Criteria / Software security assurance / Computer security / Security / Data security

          TOWARD A COMPREHENSIVE INFOSEC CERTIFICATION METHODOLOGY  Charles N. Payne, Judith N. Froscher and Carl E. Landwehr Center for High Assurance Computing Systems Naval Research Laboratory Washington, D.Cā€“5337

          Add to Reading List

          Source URL: www.landwehr.org

          Language: English - Date: 2014-08-18 19:00:26
          8IEEE standards / IBM AIX / Unix / HP-UX / POSIX / Sun Microsystems / Solaris / Trusted operating system / Single UNIX Specification / Software / Computing / System software

          MR. PAMU KUMAR SWAMY SUMMARY Over 20 years of experience in Information Technology Infrastructure management (IMS) as principal technical consultant for major commercial open systems and open source systems, data storage

          Add to Reading List

          Source URL: www.elucitsoftware.com

          Language: English - Date: 2012-03-09 23:37:04
          9National security / Public safety / National Security Agency / Multilevel security / Trusted computing base / Trusted Computer System Evaluation Criteria / Ring / Information security / Database security / Computer security / Security / Crime prevention

          To Appear, IFIP World Congress ā€˜94 Link 3, Issue 5: How Much is Safety Worth? Sess. L-29.2, 1 Sept 94 Hidden safety requirements in large-scale systems Carl E. Landwehr

          Add to Reading List

          Source URL: www.landwehr.org

          Language: English - Date: 2014-08-18 19:31:33
          10Data security / United States government secrecy / Military communications / Committee on National Security Systems / Critical infrastructure protection / Department of Defense Architecture Framework / National Information Assurance Glossary / Communications security / Global Information Grid / Security / National security / Computer security

          Build and Operate a Trusted GIG

          Add to Reading List

          Source URL: iac.dtic.mil

          Language: English - Date: 2015-04-27 13:16:03
          UPDATE