Trusted Network Connect

Results: 26



#Item
1Computer security / Computing / Cryptography / Computer network security / Trusted computing / IPsec / Cryptographic software / Cryptographic protocols / StrongSwan / Trusted Network Connect / IF-MAP / Internet Key Exchange

The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2012-08-29 15:32:53
2

A finer grained Network Access Control using TrustView Security Architecture and Trusted Network Connect Architecture Chaitanya Vinay Hazarey CSCI 599tc Trusted Computing, Spring 2007

Add to Reading List

Source URL: hazarey.s3.amazonaws.com

Language: English - Date: 2012-04-12 21:35:06
    3Cyberwarfare / Trusted computing / Crime prevention / National security / Trusted Platform Module / IF-MAP / Trusted Computing Group / Trusted Network Connect / Network security / Computer security / Security / Computer network security

    ARCHITECT’S GUIDE: CYBERSECURITY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

    Add to Reading List

    Source URL: www.trustedcomputinggroup.org

    Language: English - Date: 2013-12-06 18:21:27
    4Security / Trusted Network Connect / Trusted Platform Module / Cloud computing / Infrastructure / Computer security / Trusted computing / Computer network security

    PDF Document

    Add to Reading List

    Source URL: www.trustedcomputinggroup.org

    Language: English - Date: 2010-09-13 09:37:20
    5Security / Trusted Network Connect / Trusted Platform Module / Cloud computing / Infrastructure / Computer security / Trusted computing / Computer network security

    PDF Document

    Add to Reading List

    Source URL: www.trustedcomputinggroup.org

    Language: English - Date: 2010-09-13 09:37:20
    6Technology / Trusted computing / Telemetry / Network architecture / Trusted Network Connect / IF-MAP / SCADA / Control system security / Trusted Computing Group / Computer security / Computer network security / Computing

    ARCHITECT’S GUIDE: ICS SECURITY USING TNC TECHNOLOGY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

    Add to Reading List

    Source URL: www.trustedcomputinggroup.org

    Language: English - Date: 2013-11-06 16:49:30
    7Next-Generation Secure Computing Base / Trusted Execution Technology / Trusted Network Connect / Trusted Computing Group / Computer security / Trusted computing / Trusted Platform Module

    Trusted Computing and Free Software RMLL 2009 – Nantes Frédéric Guihéry AMOSSYS July 9, 2009

    Add to Reading List

    Source URL: www.amossys.fr

    Language: English - Date: 2012-07-25 04:35:25
    8Disk encryption / Trusted Platform Module / Trusted Computing Group / Computer network security / Cryptographic software / BitLocker Drive Encryption / Trusted Network Connect / Next-Generation Secure Computing Base / Direct Anonymous Attestation / Computer security / Trusted computing / Cryptography

    Trusted Platform Module (TPM)

    Add to Reading List

    Source URL: www.trustedcomputinggroup.org

    Language: English - Date: 2009-03-28 00:28:27
    9Mitre Corporation / Open Vulnerability and Assessment Language / Trusted Network Connect / Mitre / Security Content Automation Protocol / Computer security / Clothing / Christianity

    Change in Operational Model for OVAL Over the past two years, the security automation leadership within the US Government (DHS, NIST, and NSA) has been developing a long-term strategy for security automation that focuse

    Add to Reading List

    Source URL: oval.mitre.org

    Language: English - Date: 2014-05-14 17:18:06
    10Data / Computer network security / Trusted computing / Internet protocols / StrongSwan / Trusted Network Connect / IF-MAP / Trusted Computing Group / Internet Key Exchange / Computer security / Computing / Cryptographic protocols

    The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

    Add to Reading List

    Source URL: www.strongswan.org

    Language: English - Date: 2012-08-29 15:32:53
    UPDATE