Trusted system

Results: 509



#Item
151focus  building software securely EROS: A Principle-Driven Operating System from the

focus building software securely EROS: A Principle-Driven Operating System from the

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:18
152“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten Schwan Georgia Tech Information Security Center & Center for Expe

“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten Schwan Georgia Tech Information Security Center & Center for Expe

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-09 17:34:04
153Attacking SMM Memory via Intel® CPU Cache Poisoning Rafal Wojtczuk [removed] Joanna Rutkowska [removed]

Attacking SMM Memory via Intel® CPU Cache Poisoning Rafal Wojtczuk [removed] Joanna Rutkowska [removed]

Add to Reading List

Source URL: invisiblethingslab.com

Language: English - Date: 2009-03-19 09:49:58
154Case Study: Public Relations  MarkMonitor Delivers Trusted Domain Management for Edelman  Executive Summary

Case Study: Public Relations MarkMonitor Delivers Trusted Domain Management for Edelman Executive Summary

Add to Reading List

Source URL: www.markmonitor.com

Language: English - Date: 2015-02-24 12:52:19
155

"B IS FOR BUSINESS : MANDATORY SECURITY CRITERIA AND THE OECD GUIDELINES FOR INFORMATION SYSTEMS SECURITY" Professor William J Caelli Head School of Data Communications

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1996-10-28 00:00:00
156Redcare GSM Roaming Technical product information Redcare GSM Roaming protects customers with a grade 4 dual path alarm signalling system that uses BT’s trusted Redcare network. The dual path system uses both a phone l

Redcare GSM Roaming Technical product information Redcare GSM Roaming protects customers with a grade 4 dual path alarm signalling system that uses BT’s trusted Redcare network. The dual path system uses both a phone l

Add to Reading List

Source URL: www.redcare.bt.com

Language: English - Date: 2015-01-09 08:10:14
157Common Criteria  This brochure was produced by Syntegra on behalf of the Common Criteria Project Sponsoring Organisations

Common Criteria This brochure was produced by Syntegra on behalf of the Common Criteria Project Sponsoring Organisations

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
1585-5 Development of the Trusted Time Stamping System IWAMA Tsukasa, KURIHARA Noriyuki, IMAE Michito, IMAMURA Kuniyasu, KOTAKE Noboru, GOTOH Tadahiro, SUZUYAMA Tomonari, and MORIKAWA Takao IT social infrastructures based o

5-5 Development of the Trusted Time Stamping System IWAMA Tsukasa, KURIHARA Noriyuki, IMAE Michito, IMAMURA Kuniyasu, KOTAKE Noboru, GOTOH Tadahiro, SUZUYAMA Tomonari, and MORIKAWA Takao IT social infrastructures based o

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2014-01-20 00:16:34
159X1 Search 8 Virtual Edition is Verified as Citrix Ready X1’s Lightning-Fast Search of Files & Emails in Virtual Desktop Environments is Trusted to Enhance Citrix Virtualization Infrastructure Solutions PASADENA, CALIF.

X1 Search 8 Virtual Edition is Verified as Citrix Ready X1’s Lightning-Fast Search of Files & Emails in Virtual Desktop Environments is Trusted to Enhance Citrix Virtualization Infrastructure Solutions PASADENA, CALIF.

Add to Reading List

Source URL: www.x1.com

Language: English - Date: 2014-03-19 13:08:09
160Introduction COMP9242 2008/S2 Week 1 Part 1  ©2008 Gernot Heiser UNSW/NICTA/OKL. Distributed under Creative Commons Attribution License

Introduction COMP9242 2008/S2 Week 1 Part 1 ©2008 Gernot Heiser UNSW/NICTA/OKL. Distributed under Creative Commons Attribution License

Add to Reading List

Source URL: www.ok-labs.com

Language: English - Date: 2009-10-01 17:42:24