Trusted operating system

Results: 85



#Item
1Computer security / Cryptography / Computing / Security / Trusted Platform Module / Data in use / Embedded system / Physical unclonable function / Trusted Computing / Software / Operating system / Key management

Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan Developers seek to seamlessly integrate cyber

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 15:07:52
2System software / Computing / Software / Hypervisor / Trusted Computing / Protection ring / Hardware virtualization / Operating system / Virtualization / Malware / Embedded hypervisor / Qubes OS

Microsoft Word - Weber_Weber_Virtualisation_English

Add to Reading List

Source URL: www.itas.kit.edu

Language: English - Date: 2013-09-06 09:56:55
3Computer architecture / Computer security / System software / Trusted computing / Operating system kernels / Boot loaders / Cryptographic software / Trusted Platform Module / Trusted Execution Technology / Trusted Computing Group / Loadable kernel module / Loader

Analysis of a Measured Launch

Add to Reading List

Source URL: evenmere.org

Language: English - Date: 2008-06-23 13:59:25
4

Implementing an Untrusted Operating System on Trusted Hardware David Lie Dept. of Comp. and Elec. Eng. University of Toronto Toronto, ONT M2J 1A2

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2008-07-20 00:16:18
    5Computing / Crime prevention / National security / Computer network security / Secure communication / Ring / Operating system / Trusted computing base / Hardware architect / Computer security / Security / Central processing unit

    Naval Research Laboratory Washington, DC 20375*5000 NRL ReportA Framework for Evaluating Computer Architectures to

    Add to Reading List

    Source URL: www.landwehr.org

    Language: English - Date: 2014-08-18 19:00:23
    6Multilevel security / Secure state / Multics / Ring / Operating system / XTS-400 / Trusted system / Computer security / Security / Bell–LaPadula model

    rim NRL Report 8806 :f. rr

    Add to Reading List

    Source URL: www.landwehr.org

    Language: English - Date: 2014-08-18 18:59:49
    7Crime prevention / National security / Common Criteria / Trusted Computer System Evaluation Criteria / Information security / Trusted computing base / Operating system / National Security Agency / Multilevel security / Computer security / Security / Evaluation

    Chapter #N IMPROVING INFORMATION FLOW IN THE INFORMATION SECURITY MARKET DoD Experience and Future Directions Carl E. Landwehr University of Maryland

    Add to Reading List

    Source URL: www.landwehr.org

    Language: English - Date: 2014-08-18 19:01:35
    8Gernot Heiser / L4 microkernel family / Formal verification / Real-time operating systems / Kernel / Computer security / Integrity / Mach / Ring / Computer architecture / Trusted computing base / Microkernel

    seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

    Add to Reading List

    Source URL: sel4.systems

    Language: English - Date: 2014-09-23 22:58:53
    9IEEE standards / IBM AIX / Unix / HP-UX / POSIX / Sun Microsystems / Solaris / Trusted operating system / Single UNIX Specification / Software / Computing / System software

    MR. PAMU KUMAR SWAMY SUMMARY Over 20 years of experience in Information Technology Infrastructure management (IMS) as principal technical consultant for major commercial open systems and open source systems, data storage

    Add to Reading List

    Source URL: www.elucitsoftware.com

    Language: English - Date: 2012-03-09 23:37:04
    UPDATE