Trusted operating system

Results: 85



#Item
31Least Privilege and More1 Fred B. Schneider Department of Computer Science Cornell University Ithaca, New York 14853

Least Privilege and More1 Fred B. Schneider Department of Computer Science Cornell University Ithaca, New York 14853

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2003-07-02 11:18:02
32A Cryptographically-Based Operating System Security Model That Protects against Privileged Attackers Christian Payne  This thesis is presented for the

A Cryptographically-Based Operating System Security Model That Protects against Privileged Attackers Christian Payne This thesis is presented for the

Add to Reading List

Source URL: researchrepository.murdoch.edu.au

Language: English - Date: 2011-02-17 01:18:57
33The Case for Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency

The Case for Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2012-02-16 19:38:59
34Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency

Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2012-08-30 23:24:59
35The Pension Bureau is working to establish and operate a sustainable pension system that is truly trusted by people and which contributes to the security of people’s lives by planning for and operating a public pension

The Pension Bureau is working to establish and operate a sustainable pension system that is truly trusted by people and which contributes to the security of people’s lives by planning for and operating a public pension

Add to Reading List

Source URL: www.mhlw.go.jp

Language: English - Date: 2013-09-10 03:19:45
36Embedded Security for Internet of Things Arijit Ukil Jaydip Sen  Sripad Koilakonda

Embedded Security for Internet of Things Arijit Ukil Jaydip Sen Sripad Koilakonda

Add to Reading List

Source URL: iotsecuritylab.com

Language: English - Date: 2014-08-14 00:16:23
37Formal Modeling and Verification of CloudProxy Wei Yang Tan1 , Rohit Sinha1 , John L. Manferdelli2 , and Sanjit A. Seshia1 1 2

Formal Modeling and Verification of CloudProxy Wei Yang Tan1 , Rohit Sinha1 , John L. Manferdelli2 , and Sanjit A. Seshia1 1 2

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2014-08-07 18:17:41
38PANEL TITLE: Your Always-On Connection & the Telecommuter PANEL CHAIR: Peter Dinsmore, NAI Labs, Network Associates PANELISTS: Michael StJohns, Excite@Home

PANEL TITLE: Your Always-On Connection & the Telecommuter PANEL CHAIR: Peter Dinsmore, NAI Labs, Network Associates PANELISTS: Michael StJohns, Excite@Home

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
39Policy-Enhanced Linux Paul C. Clark Naval Postgraduate School 833 Dyer Rd., Code CS Monterey, CA[removed]E-mail: [removed]

Policy-Enhanced Linux Paul C. Clark Naval Postgraduate School 833 Dyer Rd., Code CS Monterey, CA[removed]E-mail: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
40Proceedings of the Seminar on the DoD Computer Security Initiative Program, July 17-18, 1979, Gaithersburg, Maryland

Proceedings of the Seminar on the DoD Computer Security Initiative Program, July 17-18, 1979, Gaithersburg, Maryland

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-08-22 14:26:10