Trusted Information Systems

Results: 75



#Item
61Surveillance / Regional Information Sharing Systems / Law enforcement agency

Providing Trusted Service for More Than 40 Years RISS A Proven Resource for Law Enforcement An Excellent Return

Add to Reading List

Source URL: www.riss.net

Language: English - Date: 2014-01-24 12:39:51
62Incident management / Firefighting in the United States / Virtual reality / Management systems / Social information processing / InciWeb / Skype / Social media / Incident Command System / Software / Computing / Emergency management

St. Denis et al. Trial by Fire: Deployment of Trusted Digital Volunteers Trial by Fire: The Deployment of Trusted Digital Volunteers in the

Add to Reading List

Source URL: www.nifc.gov

Language: English - Date: 2012-03-19 10:04:32
63Payment systems

APPENDIX C Designation of Authorized Representative You can give a trusted person permission to talk about this application with us, see your information, and act for you on matters related to this application, including

Add to Reading List

Source URL: info.dhhs.state.nc.us

Language: English - Date: 2014-05-29 14:20:10
    64Computing / Federal Information Security Management Act / Risk management framework / Security controls / Certified Information Systems Security Professional / Health Insurance Portability and Accountability Act / Computer security / Data security / Security

    JD Biggs & Associates, Inc. Your Trusted Partner for Improved Security & Privacy   JD  Biggs  is  an  Information  Security  and  Privacy  consulting  firm  located  near  Washingto

    Add to Reading List

    Source URL: www.jdbiggs.com

    Language: English - Date: 2012-05-15 09:35:37
    65Computer law / Federal Information Security Management Act / Security / Certified Information Systems Security Professional / Cloud computing / Computer security / Data security / Computing

    JD Biggs & Associates, Inc. Your Trusted Partner for Improved Security & Privacy   JD  Biggs  is  an  Information  Security  and  Privacy  consulting  firm  located  near  Washingto

    Add to Reading List

    Source URL: www.jdbiggs.com

    Language: English - Date: 2012-05-15 09:35:45
    66Cyberwarfare / Computer law / Software testing / Federal Information Security Management Act / Certified Information Systems Security Professional / Vulnerability / Computer security / Data security / Computing

    JD Biggs & Associates, Inc. Your Trusted Partner for Improved Security & Privacy   JD  Biggs  is  an  Information  Security  and  Privacy  consulting  firm  located  near  Washingto

    Add to Reading List

    Source URL: www.jdbiggs.com

    Language: English - Date: 2012-05-15 09:34:44
    67Computer network security / Trusted Computer System Evaluation Criteria / Trusted computing / Authentication / Trusted computing base / Trusted system / Information security / Password / Trusted path / Security / Computer security / Access control

    NCSC-TG-017 Library No[removed],479 Version 1 FOREWORD A Guide to Understanding Identification and Authentication in Trusted Systems

    Add to Reading List

    Source URL: www.csirt.org

    Language: English - Date: 2011-07-04 18:31:58
    68Mathematics / Database / Advantage / Information retrieval / Permutation / Cache / Information / Data / Database management systems / Private information retrieval / Combinatorics

    Private Information Retrieval Using Trusted Hardware Shuhong Wang1 , Xuhua Ding1 , Robert H. Deng1 , and Feng Bao2 1 School of Information Systems, SMU {shuhongw,xhding,robertdeng}@smu.edu.sg

    Add to Reading List

    Source URL: www.mysmu.edu

    Language: English - Date: 2006-06-12 08:04:46
    69Cache / XTR

    An Efficient PIR Construction Using Trusted Hardware Yanjiang Yang1,2 , Xuhua Ding1 , Robert H. Deng1 , and Feng Bao2 1 School of Information Systems, Singapore Management University,

    Add to Reading List

    Source URL: www.mysmu.edu

    Language: English - Date: 2008-08-07 23:05:07
    70Crime prevention / National security / Trusted computing / Cryptography / Trusted Platform Module / OSGi / Security policy / Attestation clause / Information security / Computer security / Security / Public safety

    Security Model Oriented Attestation on Dynamically Reconfigurable Component-Based Systems

    Add to Reading List

    Source URL: sei.pku.edu.cn

    Language: English - Date: 2010-11-11 23:56:43
    UPDATE