Trusted operating system

Results: 85



#Item
81Trusted computing base / Separation kernel / Kernel / Operating system / Multilevel security / Linux kernel / Ring / Unix / Server / Computer architecture / System software / Computer security

PDF Document

Add to Reading List

Source URL: www.csl.sri.com

Language: English - Date: 2004-05-25 18:32:46
82Computing / Trusted Network Connect / IF-MAP / Trusted Platform Module / Network Access Control / Trusted system / Virtual private network / Network security / Operating system / Computer security / Computer network security / Trusted computing

PDF Document

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2012-10-26 12:49:30
83Multilevel security / XTS-400 / Mandatory access control / National Information Assurance Partnership / Common Criteria / Protection Profile / Evaluation Assurance Level / Trusted operating system / Multiple Independent Levels of Security / Computer security / Evaluation / National Security Agency

PDF Document

Add to Reading List

Source URL: selfless-security.offthisweek.com

Language: English - Date: 2009-04-05 14:51:40
84IBM AIX / POWER6 / IBM System i / POWER7 / IBM POWER / Operating system / Trusted Platform Module / PowerVM / IBM System p / Computer architecture / IBM / Server hardware

PDF Document

Add to Reading List

Source URL: publib.boulder.ibm.com

Language: English
85Computer network security / Multilevel security / Mandatory access control / Ring / Trusted system / Operating system / Capability-based security / Kernel / Security policy / Computer security / Security / Access control

PDF Document

Add to Reading List

Source URL: cs.unomaha.edu

Language: English - Date: 2004-09-02 16:22:23
UPDATE