Trusted computing

Results: 881



#Item
791Trusted computing / Cryptography / Disk encryption / Trusted Computing Group / Trusted Platform Module / BitLocker Drive Encryption / Trusted computing base / Computer security / Microsoft Windows / Security

Modeling TCG-based Secure Systems with Colored Petri Nets? Liang Gu† , Yao Guo†?? , Yanjiang Yang § , Feng Bao§ , Hong Mei† † Key Laboratory of High Confidence Software Technologies (Ministry of Education),

Add to Reading List

Source URL: sei.pku.edu.cn

Language: English - Date: 2010-11-12 00:51:14
792Gentoo Linux / Trusted computing / Cryptography / Business law / Copyright law / Trusted Execution Technology / Portage / RPM Package Manager / Ebuild / Software / Computer security / System software

SCOBA: Source Code Based Attestation on Custom Software ∗ † Liang Gu‡ , Yao Guo‡ , Anbang Ruan§ , Qingni Shen§ ,Hong Mei‡

Add to Reading List

Source URL: sei.pku.edu.cn

Language: English - Date: 2010-11-12 00:59:22
793Crime prevention / National security / Trusted computing / Cryptography / Trusted Platform Module / OSGi / Security policy / Attestation clause / Information security / Computer security / Security / Public safety

Security Model Oriented Attestation on Dynamically Reconfigurable Component-Based Systems

Add to Reading List

Source URL: sei.pku.edu.cn

Language: English - Date: 2010-11-11 23:56:43
794

1 Trusted Cloud Innovatives, sicheres und rechtskonformes Cloud Computing

Add to Reading List

Source URL: trusted-cloud.de

Language: German - Date: 2014-03-04 10:50:31
    795Business law / Copyright law / Security / Trusted Platform Module / Trustworthy computing / Trusted Execution Technology / Security-Enhanced Linux / Mandatory access control / Type enforcement / Computer security / Trusted computing / Cryptography

    The 9th International Conference for Young Computer Scientists Model–Driven Remote Attestation: Attesting Remote System from Behavioral Aspect Liang Gu1,2 , Xuhua Ding2 , Robert H. Deng2 , Yanzhen Zou1 , Bing Xie1 , W

    Add to Reading List

    Source URL: sei.pku.edu.cn

    Language: English - Date: 2010-11-11 21:16:45
    796Procedural programming languages / Business law / Copyright law / Cryptography / Trusted Computing / Kernel / Exception handling / Subroutine / Call stack / Computing / Software engineering / Computer programming

    Remote Attestation on Function Execution Liang Gu 1 , Yueqiang Cheng2 , Xuhua Ding2 , Robert H. Deng2 , Yao Guo1 , Weizhong Shao1 1 Key Laboratory of High Confidence Software Technologies,

    Add to Reading List

    Source URL: sei.pku.edu.cn

    Language: English - Date: 2010-11-12 01:06:25
    797System software / Trusted computing / Business law / Copyright law / Trusted Execution Technology / Gentoo Linux / Portage / Attestation clause / Virtual machine / Computer security / Software / Cryptography

    Practical Property-based Attestation on Free Software Liang Gu1 , Anbang Ruan1,2 , Yao Guo1 , Qingni Shen1,2 , Xiangqun Chen1 Key Laboratory of High Confidence Software Technologies (Ministry of Education), Institute of

    Add to Reading List

    Source URL: sei.pku.edu.cn

    Language: English - Date: 2010-11-12 01:12:37
    798Cryptography / Business law / Copyright law / Process management / Trusted Execution Technology / Kernel / Trusted Platform Module / Operating system / Data dependency / Computer security / Computing / Trusted computing

    Remote Attestation on Program Execution ∗ Liang Gu1,2 , Xuhua Ding2 , Robert H. Deng2 , Bing Xie1 , Hong Mei1 1 2

    Add to Reading List

    Source URL: www.mysmu.edu

    Language: English - Date: 2008-11-03 21:07:22
    799Cryptography / Business law / Copyright law / Trusted Execution Technology / Kernel / Mandatory access control / Attestation clause / Law of obligations / Ring / Computer security / Security / Trusted computing

    Trusted Isolation Environment: An Attestation Architecture with Usage Control Model Anbang Ruan1,2, Qingni Shen1,2, Liang Gu2,3, Li Wang1,2, Lei Shi2,3, Yahui Yang1,2, and Zhong Chen1,2,3 1

    Add to Reading List

    Source URL: sei.pku.edu.cn

    Language: English - Date: 2010-11-11 21:05:05
    800Trusted computing / Disk encryption / Kernel / Trusted Execution Technology / Virtual machine / Ring / Trusted Platform Module / Operating system / Loadable kernel module / Software / Computing / Computer security

    SECURITY & PRIVACY Rapid Trust Establishment for Pervasive Personal Computing

    Add to Reading List

    Source URL: www.cs.cmu.edu

    Language: English - Date: 2007-10-30 08:22:15
    UPDATE