Trusted computing

Results: 881



#Item
721Trusted Platform Module / Trusted computing / Key generation / Key / Access control / Cryptography / Key management / Public-key cryptography

Microsoft PowerPoint - Secure Device ID.ppt

Add to Reading List

Source URL: www.ieee802.org

Language: English - Date: 2005-07-18 23:22:07
722Computing / Computer law / Cryptography standards / Federal Information Security Management Act / Security controls / Security Content Automation Protocol / Managed Trusted Internet Protocol Service / Information security management system / Information security / Computer security / Security / Data security

Computer Security Division 2011 Annual Report NISTIR 7816

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-10 21:34:23
723Law / Inspector General / Managed Trusted Internet Protocol Service / CSB / United States Environmental Protection Agency / E-Government Act / KPMG / Government / Computing / Computer law / U.S. Chemical Safety and Hazard Investigation Board / Federal Information Security Management Act

The U.S. Chemical Safety and Hazard Investigation Board Complies With the Federal Information Security Management Act (Fiscal Year 2013)

Add to Reading List

Source URL: www.csb.gov

Language: English - Date: 2014-04-10 14:15:58
724Computing / Cyberwarfare / Crime prevention / National security / Federal Information Security Management Act / National Institute of Standards and Technology / FIPS 140-2 / National Strategy for Trusted Identities in Cyberspace / National Cybersecurity Center / Computer security / Security / Computer network security

Testimony of Charles H. Romine Director Information Technology Laboratory National Institute of Standards and Technology

Add to Reading List

Source URL: science.house.gov

Language: English - Date: 2014-03-06 10:35:35
725Computing / ISO standards / Ubiquitous computing / MIFARE / HID Global / Computer security / Java Card / ISO/IEC 14443 / Card reader / Smart cards / Security / Radio-frequency identification

LOGICAL AND PHYSICAL ACCESS SOLUTIONS Crescendo® C1150 ƒƒ Higher security – Encryption and data signing protects data-at-rest and enables trusted secure communications. ƒƒ Supports Secure Identity Object™ (SIO)

Add to Reading List

Source URL: www.planc.biz

Language: English - Date: 2013-12-17 10:12:36
726Applied mathematics / Formal methods / Inter-process communication / Microkernel / Trusted computing base / Formal verification / Kernel / Remote procedure call / Software verification / Computer architecture / Computing / Theoretical computer science

S¯adhan¯a Vol. 34, Part 1, February 2009, pp. 145–191. © Printed in India Proving the correctness of client/server software EYAD ALKASSAR, SEBASTIAN BOGAN and WOLFGANG J PAUL Computer Science Department, Saarland U

Add to Reading List

Source URL: www.ias.ac.in

Language: English - Date: 2009-02-20 06:03:15
727Computing / Cyberwarfare / Crime prevention / National security / Federal Information Security Management Act / National Institute of Standards and Technology / FIPS 140-2 / National Strategy for Trusted Identities in Cyberspace / National Cybersecurity Center / Computer security / Security / Computer network security

Testimony of Charles H. Romine Director Information Technology Laboratory National Institute of Standards and Technology

Add to Reading List

Source URL: www.commerce.gov

Language: English - Date: 2014-03-10 10:42:18
728Cloud infrastructure / Cloud communications / Cloud collaboration / Cloud computing / Centralized computing / Computing

Establishing a Trusted Cloud Europe A policy vision document by the Steering Board of the European Cloud Partnership

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2014-03-21 12:14:45
729Cloud infrastructure / Cloud communications / Cloud collaboration / Cloud computing / Centralized computing / Computing

Establishing a Trusted Cloud Europe A policy vision document by the Steering Board of the European Cloud Partnership

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2014-03-21 12:13:00
730Cloud infrastructure / Cloud communications / Cloud collaboration / Cloud computing / Centralized computing / Computing

Establishing a Trusted Cloud Europe A policy vision document by the Steering Board of the European Cloud Partnership

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2014-03-21 12:14:27
UPDATE