Trusted system

Results: 509



#Item
41Implementing an Untrusted Operating System on Trusted Hardware David Lie Dept. of Comp. and Elec. Eng. University of Toronto Toronto, ONT M2J 1A2

Implementing an Untrusted Operating System on Trusted Hardware David Lie Dept. of Comp. and Elec. Eng. University of Toronto Toronto, ONT M2J 1A2

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2008-07-20 00:16:18
    42Your Trusted Partner in Health Care Annual Report to the Community BCBSF: Working Toward An Excellent, Efficient Health System

    Your Trusted Partner in Health Care Annual Report to the Community BCBSF: Working Toward An Excellent, Efficient Health System

    Add to Reading List

    Source URL: www.nonprofithealthcare.org

    Language: English - Date: 2012-06-27 16:39:22
      43Erscheint in: Anna Kournikova Deleted By Memeright Trusted System – Kunst im Zeitalter des Geistigen Eigentums, Hartware MedienKunstVerein Dortmund, SeptemberInke Arns

      Erscheint in: Anna Kournikova Deleted By Memeright Trusted System – Kunst im Zeitalter des Geistigen Eigentums, Hartware MedienKunstVerein Dortmund, SeptemberInke Arns

      Add to Reading List

      Source URL: www.hmkv.de

      Language: German - Date: 2010-05-08 11:27:49
        44Trusted Gateway System™  Secure Multi-Directional Data Transfer. Features and Benefits n	Included

        Trusted Gateway System™ Secure Multi-Directional Data Transfer. Features and Benefits n Included

        Add to Reading List

        Source URL: www.raytheon.com

        Language: English - Date: 2015-04-01 15:57:41
          45Trusted System Concepts  Trusted System Concepts Marshall D. Abrams, Ph.D. Michael V. Joyce The MITRE Corporation

          Trusted System Concepts Trusted System Concepts Marshall D. Abrams, Ph.D. Michael V. Joyce The MITRE Corporation

          Add to Reading List

          Source URL: www.acsac.org

          Language: English - Date: 1999-09-25 11:38:46
            46Vendor Spotlight  OCTOBER 2012 IBM Offers Cloud Security for a Smarter Planet

            Vendor Spotlight OCTOBER 2012 IBM Offers Cloud Security for a Smarter Planet

            Add to Reading List

            Source URL: www.intel.com

            Language: English - Date: 2015-01-09 15:28:45
            47Cloud Design Uses Enomaly ECP* for Platform Security

            Cloud Design Uses Enomaly ECP* for Platform Security

            Add to Reading List

            Source URL: www.intel.com

            Language: English - Date: 2014-03-01 18:42:02
            48ARCHITECT’S GUIDE: ICS SECURITY USING TNC TECHNOLOGY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

            ARCHITECT’S GUIDE: ICS SECURITY USING TNC TECHNOLOGY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

            Add to Reading List

            Source URL: www.trustedcomputinggroup.org

            Language: English - Date: 2013-11-06 16:49:30
            49An Overview of the Annex System D.A. Grove T.C. Murray  C.A. Owen C.J. North J.A. Jones M.R. Beaumont

            An Overview of the Annex System D.A. Grove T.C. Murray C.A. Owen C.J. North J.A. Jones M.R. Beaumont

            Add to Reading List

            Source URL: www.acsac.org

            Language: English - Date: 2007-12-17 22:49:19
            50Another Way to Circumvent Intel® Trusted Execution Technology Tricking SENTER into misconfiguring VT-d via SINIT bug exploitation Rafal Wojtczuk   Joanna Rutkowska

            Another Way to Circumvent Intel® Trusted Execution Technology Tricking SENTER into misconfiguring VT-d via SINIT bug exploitation Rafal Wojtczuk Joanna Rutkowska

            Add to Reading List

            Source URL: invisiblethingslab.com

            Language: English - Date: 2009-12-21 13:05:46