Trusted path

Results: 23



#Item
21Crime prevention / National security / Electronic commerce / Secure communication / Ring / Operating system / Trusted path / Multilevel security / Trusted system / Computer security / Security / Computer network security

The Trusted Function in Secure Decentralized Processing

Add to Reading List

Source URL: pt.withy.org

Language: English - Date: 2003-03-19 14:04:01
22Human–computer interaction / User interface / Usability / End-user development / Trusted path / User / Principle of least privilege / User interface design / Customer relationship management / Human–computer interaction / Computing / Software

User Interaction Design for Secure Systems Ka-Ping Yee University of California, Berkeley

Add to Reading List

Source URL: zesty.ca

Language: English - Date: 2002-09-03 04:20:48
23Trusted computing / Microkernel / Security / Trusted computing base / Kernel / Trusted path / L4 microkernel family / Next-Generation Secure Computing Base / Ring / Computer security / Computer architecture / System software

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components —

Add to Reading List

Source URL: os.inf.tu-dresden.de

Language: English - Date: 2004-08-02 05:13:46
UPDATE