Trusted computing

Results: 881



#Item
81Trusted Platform Module Library Part 1: Architecture Family “2.0” Level 00 RevisionOctober 30, 2014

Trusted Platform Module Library Part 1: Architecture Family “2.0” Level 00 RevisionOctober 30, 2014

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2014-11-07 17:19:25
82Poster: Forcing the Cloud to Forget by Attesting Data Deletion Michael Backes Fabian Bendun

Poster: Forcing the Cloud to Forget by Attesting Data Deletion Michael Backes Fabian Bendun

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:40
83Protection profiles for secure signature creation device — Part 6: Extension for device with key import and trusted communication with signature creation application

Protection profiles for secure signature creation device — Part 6: Extension for device with key import and trusted communication with signature creation application

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2014-02-14 05:40:12
84BRICS RSBogetoft et al.: Secure Computing, Economy, and Trust: A Generic Solution for Secure Auctions  BRICS Basic Research in Computer Science

BRICS RSBogetoft et al.: Secure Computing, Economy, and Trust: A Generic Solution for Secure Auctions BRICS Basic Research in Computer Science

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2005-06-06 07:42:15
85Solving the Data Security Dilemma with Self-Encrypting Drives May 2010 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006

Solving the Data Security Dilemma with Self-Encrypting Drives May 2010 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2010-05-19 15:06:35
    86BYLAWS OF TRUSTED COMPUTING GROUP (An Oregon Nonprofit Corporation) Adopted 26 Feb 2003 As Amended through JulyARTICLE 1: DEFINITIONS

    BYLAWS OF TRUSTED COMPUTING GROUP (An Oregon Nonprofit Corporation) Adopted 26 Feb 2003 As Amended through JulyARTICLE 1: DEFINITIONS

    Add to Reading List

    Source URL: www.trustedcomputinggroup.org

    - Date: 2012-07-26 13:53:17
      87Trusted Computing for Trusted Provenance

      Trusted Computing for Trusted Provenance

      Add to Reading List

      Source URL: www.nesc.ac.uk

      Language: English - Date: 2009-05-13 03:57:59
        88The National Security Agency invites you to attend The 2nd Annual NSA Trusted Computing Conference and Exposition September 20-22, 2011 Orlando, Florida The theme for the year’s event is “Using COTS Technologies to D

        The National Security Agency invites you to attend The 2nd Annual NSA Trusted Computing Conference and Exposition September 20-22, 2011 Orlando, Florida The theme for the year’s event is “Using COTS Technologies to D

        Add to Reading List

        Source URL: www.nsa.gov

        Language: English - Date: 2011-07-08 09:43:11
          89Sancus: Low-cost trustworthy extensible networked devices with a zero-software Trusted Computing Base Job Noorman Anthony Van Herrewege  Pieter Agten

          Sancus: Low-cost trustworthy extensible networked devices with a zero-software Trusted Computing Base Job Noorman Anthony Van Herrewege Pieter Agten

          Add to Reading List

          Source URL: lirias.kuleuven.be

          Language: English
            902002 Paper 8 Question 6  Security (a) Explain the concept of a Trusted Computing Base and outline its meaning in the context of the access control provided by a typical Unix workstation. [5 marks]

            2002 Paper 8 Question 6 Security (a) Explain the concept of a Trusted Computing Base and outline its meaning in the context of the access control provided by a typical Unix workstation. [5 marks]

            Add to Reading List

            Source URL: www.cl.cam.ac.uk

            Language: English - Date: 2014-06-09 10:17:49