Trusted computing

Results: 881



#Item
131National security / Public safety / National Security Agency / Multilevel security / Trusted computing base / Trusted Computer System Evaluation Criteria / Ring / Information security / Database security / Computer security / Security / Crime prevention

To Appear, IFIP World Congress ‘94 Link 3, Issue 5: How Much is Safety Worth? Sess. L-29.2, 1 Sept 94 Hidden safety requirements in large-scale systems Carl E. Landwehr

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:31:33
132

Ratgeber / Wissen / Wirtschaft THEMENSERVICE Mehr Sicherheit in der Cloud So erkenne ich einen guten Cloud-Computing-Dienstleister

Add to Reading List

Source URL: www.trusted-cloud.de

Language: German - Date: 2014-08-01 04:37:51
    133Distributed computing architecture / MongoDB / NoSQL / Structured storage / Trusted Computing / Serialization / Multilevel security / XTS-400 / Data management / Computing / Computer security

    FriendStar: Extensible Web Applications with Information Flow Control Amit Levy Ali Mashtizadeh Stanford University 1

    Add to Reading List

    Source URL: www.amitlevy.com

    Language: English - Date: 2012-07-22 12:12:57
    134Smartphones / Multi-touch / IOS / ITunes / Mobile device management / IPhone / IPad / Cloud computing / SyncShield / Computing / Software / Apple Inc.

    Using Apple iOS within the secure Government world The trusted way to deploy Apple iOS Our G-Cloud Mobile Device Management (MDM) Service for Apple iOS will transform the management of your Apple estate. The CESG-complia

    Add to Reading List

    Source URL: www.scc.com

    Language: English - Date: 2015-04-24 05:54:10
    135Computer network security / Crime prevention / National security / Data security / Information security / Trusted computing base / Trusted Computer System Evaluation Criteria / Authorization / Vulnerability / Security / Computer security / Cyberwarfare

    IJIS: 3–13 / Digital Object Identifier (DOIs102070100003 Computer security Carl E. Landwehr Mitretek Systems, 7525 Colshire Drive, McLean, VA 22102, USA Published online: 27 July 2001 –  Sprin

    Add to Reading List

    Source URL: www.landwehr.org

    Language: English - Date: 2014-08-18 19:01:24
    136Load testing / Electronic commerce / Evaluation / Computing / Business / Software testing / Kitbag / Web development

    Kitbag Monitors Complex eCommerce Sites And Share Vital Data Throughout The Organisation. Kitbag is the trusted online and multi-channel retail partner for many of the leading brands within the sporting world including M

    Add to Reading List

    Source URL: www.scivisum.co.uk

    Language: English - Date: 2015-04-20 08:42:41
    137Computer security / Security / Public key infrastructure / Trusted Computing / Public key certificate / Security token / Public-key cryptography / Key management / Cyberwarfare

    SHEMP: Secure Hardware Enhanced MyProxy A Thesis Submitted to the Faculty in partial fulfillment of the requirements for the degree of

    Add to Reading List

    Source URL: www.cs.dartmouth.edu

    Language: English - Date: 2008-08-28 17:25:52
    138Virtual machines / Cloud infrastructure / Xen / VMware / Hypervisor / Hyper-V / Platform Computing / X86 virtualization / Trusted Execution Technology / System software / Software / Cloud computing

    BUILDING A PRIVATE CLOUD By Mark Black Jay Muelhoefer Parviz Peiravi Marco Righini

    Add to Reading List

    Source URL: media.cloudbook.net

    Language: English - Date: 2013-04-15 05:40:52
    139Hewlett-Packard / Blade server / Dell / IBM / Lenovo / Advantech Corporation / Computacenter / Computing / Technology / Computer hardware

    Trusted Technology Partner Winning takes a special combination of knowledge, experience and teamwork. You Don’t Need a Vendor. You Need A Partner.

    Add to Reading List

    Source URL: www.addondata.com

    Language: English - Date: 2015-01-07 13:49:56
    UPDATE