Trusted computing

Results: 881



#Item
51Smart cards / GlobalPlatform / Java Card / Reuse / Usability / Evaluation / Computing / Technology

Reuse of evidences and evaluation results Carolina Lavatelli, Trusted Labs (on behalf of ISCI) © 2012 Trusted Labs S.A.S.

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2012-09-06 07:18:36
52Business / Economy / Trusted Platform Module / Trusted computing / Phoenix Technologies / CA Technologies / Compaq / Trusted Computing Group

Trusted Computing Platform Alliance: The Mother(board) of all Big Brothers Lucky Green cypherpunks.to

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2011-09-20 13:07:03
53Elisa Bertino / Bertino / Tsutomu Kanai Award / Gene Spafford / Computer security / CERIAS / National Strategy for Trusted Identities in Cyberspace / Privacy / Computing / Electrical engineering

Elisa Bertino Professor of Computer Science Professor of Electrical and Computer Engineering (courtesy) Research Director of CERIAS Director of Cyber Center, Discovery Park

Add to Reading List

Source URL: www.issnaf.org

Language: English - Date: 2015-03-14 05:32:13
54

Trusted Computing Exemplar Project Cynthia E. Irvine, Timothy E. Levin, Thuy Nguyen, George W. Dinolt Center for Information Systems Security Studies and Research (CISR) Naval Postgraduate School The science and discipli

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2007-11-15 12:21:56
    55Computer security / Computer access control / Information theory / Access control / Mandatory access control / BellLaPadula model / Trusted Computing / Trusted computing base / Principle of least privilege / Information flow / Security kernel

    A Security Domain Model for Implementing Trusted Subject Behaviors Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Timothy Levin  Naval Postgraduate School, Computer Science Department, 1411 Cunningham Rd., Monterey, Ca

    Add to Reading List

    Source URL: cisr.nps.edu

    Language: English - Date: 2008-08-18 13:41:12
    56

    Trusted Computing white paper 21May02a.PDF

    Add to Reading List

    Source URL: www.cisr.us

    Language: English - Date: 2007-11-15 12:21:44
      57

      To appear in the 2010 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS). Timing-Accurate TPM Simulation for What-If Explorations in Trusted Computing Vandana Gunupudi

      Add to Reading List

      Source URL: nsl.cse.unt.edu

      Language: English - Date: 2012-01-08 09:38:06
        58Access control / Computer access control / Authentication / Computer file / Trusted Computing / File system / Authorization / Facebook / PERMIS / Internet privacy / Windows / Tar

        Toward strong, usable access control for shared distributed data

        Add to Reading List

        Source URL: manyasleeper.com

        Language: English - Date: 2015-07-08 14:57:22
        59

        ARCHITECT’S GUIDE: CYBERSECURITY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

        Add to Reading List

        Source URL: www.trustedcomputinggroup.org

        Language: English - Date: 2013-12-06 18:21:27
          60Computer security / Computing / Trusted computing / Cryptography / Trusted Execution Technology / X86 architecture / Trusted Platform Module / Monitor / Futures and promises / Trusted computing base / Polymerase chain reaction / Thread

          A Logic of Secure Systems and its Application to Trusted Computing Anupam Datta Jason Franklin Deepak Garg

          Add to Reading List

          Source URL: www.cs.cmu.edu

          Language: English - Date: 2009-06-02 14:26:22
          UPDATE