Trusted computing base

Results: 152



#Item
41Crime prevention / National security / Data security / Information security / Security engineering / Vulnerability / Trusted computing base / Common Criteria / Managed security service / Security / Computer security / Public safety

July 2002 By Ed Gerck, Ph.D. IT Security Consultant IT Security: Closing the

Add to Reading List

Source URL: nma.com

Language: English - Date: 2002-08-16 21:45:08
42EROS / Capability-based security / Kernel / Operating system / Principle of least privilege / KeyKOS / Trusted computing base / Persistence / Ring / Computer architecture / Computing / Computer security

focus building software securely EROS: A Principle-Driven Operating System from the

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:18
43Programming paradigms / CapDesk / Principle of least privilege / Object-capability model / Trusted computing base / Kernel / Separation of concerns / Capability-based security / Abstraction / Security / Computer security / Access control

The Structure of Authority: Why Security Is not a Separable Concern Mark S. Miller1,2 , Bill Tulloh3, , and Jonathan S. Shapiro2 1 2 3

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:19
44Metadata / Trusted computing / Trusted computing base / XrML / Next-Generation Secure Computing Base / ODRL / PlayReady / The Right to Read / Trusted Platform Module / Computer security / Digital rights management / Copyright law

Key Challenges in DRM: An Industry Perspective Brian A. LaMacchia? Microsoft Corporation One Microsoft Way Redmond, WA[removed]USA

Add to Reading List

Source URL: www.farcaster.com

Language: English - Date: 2008-08-19 02:49:34
45L4 microkernel family / Gernot Heiser / Embedded systems / Microkernel / Open Kernel Labs / Mach / Kernel / Trusted computing base / Hypervisor / System software / Computer architecture / Computing

Introduction COMP9242 2008/S2 Week 1 Part 1 ©2008 Gernot Heiser UNSW/NICTA/OKL. Distributed under Creative Commons Attribution License

Add to Reading List

Source URL: www.ok-labs.com

Language: English - Date: 2009-10-01 17:42:24
46Trusted computing base / Computer network security / Internet privacy / JavaScript / Computer security / HTTP cookie / Form / Computing / Security / Software

ConScript Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser Leo Meyerovich UC Berkeley

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2010-06-25 20:12:53
47Clark–Wilson model / Type enforcement / Trusted computing base / Mandatory Integrity Control / Access control / LOMAC / Principle of least privilege / OpenSSH / Computer security / Security / Multilevel security

Toward Automated Information-Flow Integrity Verification for Security-Critical Applications Umesh Shankar Trent Jaeger

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2006-02-09 00:36:18
48Real-time operating systems / Trusted computing base / Embedded operating systems / Microkernel / L4 microkernel family / Evaluation / Multiple Independent Levels of Security / Multilevel security / Kernel / Computer architecture / Computer security / Computing

Trustworthy Embedded Systems http://www.ertos.nicta.com.au/ Trustworthy Embedded Systems ERTOS-2 Project Plan 2009–2013 [removed]

Add to Reading List

Source URL: ssrg.nicta.com.au

Language: English - Date: 2013-10-20 22:09:39
49National Security Agency / Trusted computing base / Mandatory access control / System call / Security-Enhanced Linux / Kernel / JavaScript / XTS-400 / Computer security / Computing / Software

The Case for Abstracting Security Policies   

Add to Reading List

Source URL: anil.recoil.org

Language: English
50Trusted computing / Next-Generation Secure Computing Base / Trusted computing base / Trusted Platform Module / Microkernel / Trustworthy computing / Kernel / Ring / Virtual machine / Computer security / Computing / Security

Nexus: A New Operating System for Trustworthy Computing Alan Shieh Dan Williams

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-11-01 01:44:44
UPDATE