Trusted Information Systems

Results: 75



#Item
21Science / Information technology management / Document management systems / Management / Workflow technology / Document capture software / Workflow / Document / Fax / Technology / Business / Documents

your trusted partner for handling all the paper Ending the Paper Chase Means: • Rapid Return on Investment • Reduced Business Risk • Faster Processing Time

Add to Reading List

Source URL: www.omtool.com

Language: English - Date: 2014-01-27 16:36:19
22Information / Internet standards / Network management / System administration / Multi-agent systems / Simple Network Management Protocol / Security service / Digest access authentication / Communications protocol / Computing / Data / Internet protocols

Network Working Group Request for Comments: 1352 J. Galvin Trusted Information Systems, Inc. K. McCloghrie

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-03-27 15:09:16
23Document management systems / Oracle Corporation / Workflow / Oracle Database / Content storage management / Digital asset / Information technology management / Software / Computing

ORACLE DAT A SHEET DIVArchive The leading and most trusted digital asset content storage management system, Oracle’s Front Porch Digital DIVArchive revolutionizes digital

Add to Reading List

Source URL: www.fpdigital.com

Language: English - Date: 2015-04-09 16:39:25
24Public key infrastructure / X.509 / Certificate policy / Revocation list / Web of trust / Digital signature / Certificate authority / Public key certificate / Trusted third party / Cryptography / Public-key cryptography / Key management

Global Co-Operation in the New Millennium The 9th European Conference on Information Systems Bled, Slovenia, June 27-29, 2001 THE FUNDAMENTAL INADEQUACIES OF CONVENTIONAL PUBLIC KEY INFRASTRUCTURE

Add to Reading List

Source URL: is2.lse.ac.uk

Language: English - Date: 2001-05-31 06:19:16
25Software testing / Computer network security / Information technology audit / Global Information Assurance Certification / SANS Institute / Penetration test / Department of Defense Cyber Crime Center / Malware / Certified Information Systems Security Professional / Computer security / Cyberwarfare / Computing

THE MOST TRUSTED NAME IN INFORMATION AND SOFTWARE SECURITY TRAINING Baltimore 2014 Baltimore, MD September 22-27

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2014-06-23 10:39:59
26Decision theory / Actuarial science / Computer security / Decision making / Information security / Assurance services / Risk / Trusted system / Critical infrastructure protection / Security / National security / Public safety

Fred Cohen & Associates Industrial Control Systems Security Architecture Using architectural analysis tools for better protection decisions

Add to Reading List

Source URL: www.all.net

Language: English - Date: 2011-10-03 09:52:03
27Knowledge / Anomaly detection / Data mining / Data security / Autonomy / Predictive analytics / System / Information systems / Human factors / Cybernetics / Statistics / Science

Towards Modeling the Behavior of Autonomous Systems and Humans for Trusted Operations Weiqing Gu,1 Ranjeev Mittu,1 Julie Marble,2 Gavin Taylor,3 Ciara Sibley,1 Joseph Coyne,1 and W.F. Lawless4 1

Add to Reading List

Source URL: www.nrl.navy.mil

Language: English - Date: 2014-06-26 16:32:41
28Federal Information Security Management Act / National security / United States Department of Homeland Security / Regulatory compliance / Information security / Committee on National Security Systems / NIST Special Publication 800-53 / Managed Trusted Internet Protocol Service / Computer security / Security / Public safety

Cybersecurity: FISMA Reform

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-11-26 12:59:04
29Computing / USB flash drive / Data security / Universal Serial Bus / USB mass-storage device class / IronKey / Trusted Computing Group / Trusted Platform Module / BIOS / Computer hardware / USB / Computer security

TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems Bo Yang, Dengguo Feng, Yu Qin, Yingjun Zhang, and Weijin Wang Trusted Computing and Information Assurance Laboratory Institute of Sof

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-11 21:51:08
30Knowledge representation / Metadata / Technical communication / Geographic information system / Comparison of Research Networking Tools and Research Profiling Systems / HPCC / Data management / Information / Data

B2DROP is a secure and trusted data exchange service for researchers and scientists to keep their research data synchronized and up-to-date and to exchange with other researchers. An ideal solution to: Store and exchang

Add to Reading List

Source URL: www.eudat.eu

Language: English - Date: 2015-01-05 01:16:42
UPDATE