Trusted computing base

Results: 152



#Item
11

Sancus: Low-cost trustworthy extensible networked devices with a zero-software Trusted Computing Base Job Noorman Anthony Van Herrewege Pieter Agten

Add to Reading List

Source URL: lirias.kuleuven.be

Language: English
    12

    2002 Paper 8 Question 6 Security (a) Explain the concept of a Trusted Computing Base and outline its meaning in the context of the access control provided by a typical Unix workstation. [5 marks]

    Add to Reading List

    Source URL: www.cl.cam.ac.uk

    Language: English - Date: 2014-06-09 10:17:49
      13Computer network security / Internet Protocol / IPv6 / Trusted computing base / Computer network / Virtual private network / Kernel / Capability-based security / Ring / Computer security / Security / Computing

      An Overview of the Annex System D.A. Grove T.C. Murray C.A. Owen C.J. North J.A. Jones M.R. Beaumont

      Add to Reading List

      Source URL: www.acsac.org

      Language: English - Date: 2007-12-17 22:49:19
      14Evaluation / Trusted computing base / Microkernel / L4 microkernel family / Real-time operating systems / Gernot Heiser / Formal verification / Isabelle / Formal methods / Computer security / Computer architecture / Computing

      Mathematically Verified Software Kernels: Raising the Bar for High Assurance Implementations Dr Daniel Potts, VP of Engineering, General Dynamics C4 Systems Rene Bourquin, Member Technical Staff, General Dynamics C4 Syst

      Add to Reading List

      Source URL: sel4.systems

      Language: English - Date: 2014-07-28 22:03:39
      15Computing / Crime prevention / National security / Computer network security / Secure communication / Ring / Operating system / Trusted computing base / Hardware architect / Computer security / Security / Central processing unit

      Naval Research Laboratory Washington, DC 20375*5000 NRL ReportA Framework for Evaluating Computer Architectures to

      Add to Reading List

      Source URL: www.landwehr.org

      Language: English - Date: 2014-08-18 19:00:23
      16Crime prevention / National security / Trusted Computer System Evaluation Criteria / Trusted computing base / Vulnerability / Information security / Trusted system / Common Criteria / Software security assurance / Computer security / Security / Data security

      TOWARD A COMPREHENSIVE INFOSEC CERTIFICATION METHODOLOGY  Charles N. Payne, Judith N. Froscher and Carl E. Landwehr Center for High Assurance Computing Systems Naval Research Laboratory Washington, D.Cā€“5337

      Add to Reading List

      Source URL: www.landwehr.org

      Language: English - Date: 2014-08-18 19:00:26
      17Trusted computing / Hardware security module / Secure cryptoprocessor / Automated teller machine / EMV / Next-Generation Secure Computing Base / Smart card / Trusted Platform Module / Security of automated teller machines / Cryptography / Computer security / Espionage

      CHAPTER 18 API Attacks One is happenstance; twice is coincidence; but three times is enemy action. ā€” Goldfinger

      Add to Reading List

      Source URL: www.cl.cam.ac.uk

      Language: English - Date: 2008-04-27 09:57:39
      18National security / National Security Agency / Mandatory access control / Multilevel security / Access Control Matrix / Information security / Trusted Computer System Evaluation Criteria / Access control / Trusted computing base / Computer security / Security / Crime prevention

      Microsoft Word - 1995_CRC_Handbook_Article MSWord.doc

      Add to Reading List

      Source URL: www.landwehr.org

      Language: English - Date: 2014-08-18 19:00:38
      19Crime prevention / National security / Common Criteria / Trusted Computer System Evaluation Criteria / Information security / Trusted computing base / Operating system / National Security Agency / Multilevel security / Computer security / Security / Evaluation

      Chapter #N IMPROVING INFORMATION FLOW IN THE INFORMATION SECURITY MARKET DoD Experience and Future Directions Carl E. Landwehr University of Maryland

      Add to Reading List

      Source URL: www.landwehr.org

      Language: English - Date: 2014-08-18 19:01:35
      UPDATE