Trusted operating system

Results: 85



#Item
11Trusted Virtual Containers on Demand Katelin A. Bailey †  ∗

Trusted Virtual Containers on Demand Katelin A. Bailey † ∗

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-11-08 12:53:06
12

PDF Document

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2015-03-27 04:18:18
13Certifying Program Execution with Secure Processors Benjie Chen Robert Morris MIT Laboratory for Computer Science {benjie,rtm}@lcs.mit.edu Abstract Cerium is a trusted computing architecture that protects

Certifying Program Execution with Secure Processors Benjie Chen Robert Morris MIT Laboratory for Computer Science {benjie,rtm}@lcs.mit.edu Abstract Cerium is a trusted computing architecture that protects

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2003-06-03 23:21:03
14seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

seL4 for Dependable Systems Software Developing dependable systems requires built-in security and safety at all levels of the system, including in the lowest-level system software: the operating system and device access

Add to Reading List

Source URL: sel4.org

Language: English - Date: 2014-09-23 22:58:53
15A Model of Security for Distributed Systems  August 28, 1995 4:06 pm A New Model of Security for Distributed Systems Wm A. Wulf

A Model of Security for Distributed Systems August 28, 1995 4:06 pm A New Model of Security for Distributed Systems Wm A. Wulf

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 1998-12-07 09:06:04
16Poster: On the Usability of Secure GUIs Atanas Filyanov1 , Aysegül Nas1 , Melanie Volkamer2 , Marcel Winandy1 1 2  Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany

Poster: On the Usability of Secure GUIs Atanas Filyanov1 , Aysegül Nas1 , Melanie Volkamer2 , Marcel Winandy1 1 2 Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-06-25 08:17:52
17A Model of Security for Distributed Systems  August 28, 1995 4:06 pm A New Model of Security for Distributed Systems Wm A. Wulf

A Model of Security for Distributed Systems August 28, 1995 4:06 pm A New Model of Security for Distributed Systems Wm A. Wulf

Add to Reading List

Source URL: legion.virginia.edu

Language: English - Date: 1998-12-07 09:06:04
18Trusted MINIX: A Worked Example Albert L. Donaldson ESCOM Corporation[removed]Waples Mill Road Oakton, VA 22124

Trusted MINIX: A Worked Example Albert L. Donaldson ESCOM Corporation[removed]Waples Mill Road Oakton, VA 22124

Add to Reading List

Source URL: www.escom.com

Language: English - Date: 2006-07-19 10:32:27
19Managing Multiple Perspectives on Trust Dr. Clifford Neuman Information Sciences Institute University of Southern California [removed] Trusted computing provides methods for

Managing Multiple Perspectives on Trust Dr. Clifford Neuman Information Sciences Institute University of Southern California [removed] Trusted computing provides methods for

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-13 22:59:50