Trusted computing base

Results: 152



#Item
31Data types / Type theory / Association for Computing Machinery / Programming Language Design and Implementation / Trusted computing base / Programming language / Java / Memory safety / ALGOL 68 / Computing / Software engineering / Programming language theory

Computer security  PLDI’06 Tutorial T1: Enforcing and Expressing Security with Programming Languages

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2006-06-11 03:17:49
32Gernot Heiser / L4 microkernel family / Formal verification / Real-time operating systems / Kernel / Computer security / Integrity / Mach / Ring / Computer architecture / Trusted computing base / Microkernel

seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

Add to Reading List

Source URL: sel4.org

Language: English - Date: 2014-09-23 22:58:53
33Electronics / Trusted Platform Module / Trusted Computing Group / Mobile telecommunications / Wireless / Mobile phone / Bluetooth / Next-Generation Secure Computing Base / Trusted Execution Technology / Technology / Computer security / Trusted computing

TECHNOLOGY NEWS Will Proposed Standard Make Mobile Phones More Secure?

Add to Reading List

Source URL: leavcom.com

Language: English - Date: 2013-04-12 14:46:43
34National security / Computer network security / Electronic commerce / Secure communication / Multilevel security / Trusted computing base / Operating system / Kernel / Ring / Computer security / Security / Crime prevention

A Model of Security for Distributed Systems August 28, 1995 4:06 pm A New Model of Security for Distributed Systems Wm A. Wulf

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 1998-12-07 09:06:04
35National security / Computer network security / Electronic commerce / Secure communication / Multilevel security / Trusted computing base / Operating system / Kernel / Ring / Computer security / Security / Crime prevention

A Model of Security for Distributed Systems August 28, 1995 4:06 pm A New Model of Security for Distributed Systems Wm A. Wulf

Add to Reading List

Source URL: legion.virginia.edu

Language: English - Date: 1998-12-07 09:06:04
36MINIX / Trusted Computer System Evaluation Criteria / Rainbow Series / Trusted computing base / Operating system / Trusted system / Discretionary access control / Andrew S. Tanenbaum / Ring / Computer architecture / Computer security / Computing

Trusted MINIX: A Worked Example Albert L. Donaldson ESCOM Corporation[removed]Waples Mill Road Oakton, VA 22124

Add to Reading List

Source URL: www.escom.com

Language: English - Date: 2006-07-19 10:32:27
37Cryptography / Trusted computing / Unified Extensible Firmware Interface / Trusted Execution Technology / Trusted Platform Module / Trusted computing base / Side channel attack / Hypervisor / Tamper resistance / Computer security / Security / System software

SECURE SYSTEMS DESIGN LEENDERT VAN DOORN CORPORATE FELLOW [removed] 1

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-10 23:56:00
38Trusted computing base / Ring / Rootkit / Operating system / Virtualization / Multilevel security / XTS-400 / Computer security / Security / Trusted computing

Managing Multiple Perspectives on Trust Dr. Clifford Neuman Information Sciences Institute University of Southern California [removed] Trusted computing provides methods for

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-13 22:59:50
39Electronics / Trusted Platform Module / Trusted Computing Group / Mobile telecommunications / Wireless / Mobile phone / Bluetooth / Next-Generation Secure Computing Base / Trusted Execution Technology / Technology / Computer security / Trusted computing

TECHNOLOGY NEWS Will Proposed Standard Make Mobile Phones More Secure?

Add to Reading List

Source URL: www.leavcom.com

Language: English - Date: 2013-04-12 14:46:43
40Evaluation Assurance Level / Protection Profile / Security Target / Trusted computing base / Trusted Computer System Evaluation Criteria / ITSEC / XTS-400 / Cimcor / Computer security / Evaluation / Common Criteria

Common Criteria Common Criteria for Information Technology Security Evaluation

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
UPDATE