Trusted computing

Results: 881



#Item
21Security / Computer security / Prevention / Data security / Crime prevention / Cryptography / National security / Vulnerability / Information security / Attack / Trusted computing base / Software security assurance

Security Watch Rebecca T. Mercuri Computer Security: Quality Rather than Quantity

Add to Reading List

Source URL: www.notablesoftware.com

Language: English - Date: 2007-02-28 16:29:24
22Computer security / Security / Cryptography / Trusted computing / Computer network security / Secure communication / National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing base / Common Criteria / TCB / United States Department of Homeland Security

æSec™ Composing a High-Assurance Infrastructure out of TCB Components Mark R. Heckman <> Roger R. Schell <> Edwards E. Reed <>

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:31
23Computer hardware / Computing / Computer data storage / Lenovo / Server hardware / ThinkServer / Solid-state drive / NVM Express / PCI Express / ThinkStation / IdeaPad

Lenovo System x3650 M5 World-class performance and industry-leading reliability Lenovo Trusted Platform Assurance, a built-in set of security features and practices, protects the hardware and firmware. Also deploy self-e

Add to Reading List

Source URL: www.lenovo.com

Language: English - Date: 2016-04-01 11:16:15
24Software / Computing / Internet marketing / Data management / Web analytics / Analytics / Big data / Business intelligence / Mathematical finance / Search engine optimization / Influencer marketing / Seo

Experteer is Europe‘s premium career network reaching thousands of professionals who choose Experteer as their trusted source to access senior level positions. We aim to offer the most senior level career opportunities

Add to Reading List

Source URL: experteer-downloads.s3.amazonaws.com

Language: English - Date: 2016-07-25 10:42:23
25Computer security / Security / Cryptography / Trusted computing / Data security / Computer network security / Trusted Computer System Evaluation Criteria / Trusted system / Guard / Trusted computing base / Common Criteria / Blacker

COMPOSING A HIGH-ASSURANCE INFRASTRUCTURE OUT OF TCB COMPONENTS Mark R. Heckman Roger R. Schell

Add to Reading List

Source URL: fm.csl.sri.com

Language: English - Date: 2011-12-15 18:21:30
26Computer security / Security / Computer access control / Computer network security / Access control / Identity management / Cryptography / Authentication / Password / Trusted computing base / User / Multilevel security

Computer Security in the Real World Butler W. Lampson1 Microsoft Abstract After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason i

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2000-11-10 16:38:10
27Cryptography / Computer security / Logger / Data / Logfile / Public-key cryptography / Log analysis / Trusted computing / Disk encryption / Trusted Platform Module

Continuous Tamper-proof Logging Using TPM 2.0 Arunesh Sinha1 , Limin Jia1 , Paul England2 , and Jacob R. Lorch2 1 Carnegie Mellon University, Pittsburgh, Pennsylvania, USA

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
28Hashing / Logger / Data logger / Data / Logfile / Hash-based message authentication code / Computer security / Information science / Information retrieval / Cryptography / Trusted computing / Trusted Platform Module

Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
29Computing / Internet privacy / Proxy / Computer networking / Proxy servers / Internet / Computer network security / Proxy list

myPurdue Proxy Frequently Asked Questions Student Questions Q: What is a myPurdue proxy? A: Students can give parents, legal guardians, or other trusted parties access to view certain pieces of their student information

Add to Reading List

Source URL: www.purdue.edu

Language: English - Date: 2016-08-16 10:37:59
30PlayStation / PlayStation Portable / Stork / European Distance and E-learning Network / Quality Assurance Agency for Higher Education / Computing / Education / Computer hardware

Trusted Identities Cross Border A Look at Stork-Experiences From STORK to STORK 2.0 Architecture and Technical Aspects Stork 2.0 is an EU co-funded project INFSO-ICT-PSP

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2013-03-25 06:53:35
UPDATE