Trusted computing

Results: 881



#Item
801Securing a Remote Terminal Application with a Mobile Trusted Device Alina Oprea1, Dirk Balfanz2, Glenn Durfee2, D. K. Smetters2 1

Securing a Remote Terminal Application with a Mobile Trusted Device Alina Oprea1, Dirk Balfanz2, Glenn Durfee2, D. K. Smetters2 1

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-10-23 17:32:45
802Welcome to Britannica E-STAX Your Gateway to Trusted Nonfiction E-books

Welcome to Britannica E-STAX Your Gateway to Trusted Nonfiction E-books

Add to Reading List

Source URL: liber.rsuh.ru

Language: English - Date: 2014-04-09 03:52:33
803Security Enhancements (SE) for Android Stephen Smalley Trusted Systems Research National Security Agency  CLASSIFICATION HEADER

Security Enhancements (SE) for Android Stephen Smalley Trusted Systems Research National Security Agency CLASSIFICATION HEADER

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2014-04-23 14:58:00
804WHITE PAPER Intel® Xeon® Processors Cloud Security From Silicon to the Data: A Multi-Point Approach for

WHITE PAPER Intel® Xeon® Processors Cloud Security From Silicon to the Data: A Multi-Point Approach for

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:08:10
805ISSA  Preeminent Trusted Global

ISSA Preeminent Trusted Global

Add to Reading List

Source URL: cdn-c.preemptive.com

Language: English - Date: 2013-07-31 10:48:02
806Information technology management / Trustworthy computing / Crime prevention / National security / Technology / Trusted system / Computer / Service-oriented architecture / Operating system / Security / Computer security / Computing

Trustworthy Computing Microsoft White Paper Craig Mundie – Senior Vice President and CTO, Advanced Strategies and Policy

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2003-09-10 15:47:31
807User Interaction Design for Secure Systems Ka-Ping Yee University of California, Berkeley

User Interaction Design for Secure Systems Ka-Ping Yee University of California, Berkeley

Add to Reading List

Source URL: zesty.ca

Language: English - Date: 2002-09-03 04:20:48
808To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004  Reducing TCB size by using untrusted components —

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components —

Add to Reading List

Source URL: os.inf.tu-dresden.de

Language: English - Date: 2004-08-02 05:13:46
809FINAL EVALUATION REPORT The IBM Corporation RS/6000 Distributed System

FINAL EVALUATION REPORT The IBM Corporation RS/6000 Distributed System

Add to Reading List

Source URL: www.ashtonlabs.com

Language: English - Date: 2008-08-20 17:11:02
810Distributed Computing Column 50 Distributing Trusted Third Parties, Innovation Prize, and SIROCCO Review

Distributed Computing Column 50 Distributing Trusted Third Parties, Innovation Prize, and SIROCCO Review

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-05-16 05:06:00