Back to Results
First PageMeta Content
Trusted computing base / Ring / Rootkit / Operating system / Virtualization / Multilevel security / XTS-400 / Computer security / Security / Trusted computing


Managing Multiple Perspectives on Trust Dr. Clifford Neuman Information Sciences Institute University of Southern California [removed] Trusted computing provides methods for
Add to Reading List

Document Date: 2007-05-13 22:59:50


Open Document

File Size: 40,00 KB

Share Result on Facebook

Company

Sony / Kerberos / /

/

Facility

University of Washington / University of Southern California / Information Sciences Institute / Massachusetts Institute of Technology / /

IndustryTerm

digital rights management / virtual systems / user applications / trusted computing infrastructure / managed systems / trusted computing environment / software implements / virtualization technologies / software components / software modules / trusted computing reference monitor / computing / Early systems / software component / trusted computing architectures / electronic commerce / /

OperatingSystem

Multics / /

Organization

Prospero Directory Service / University of Washington / Center for Computer Systems Security / Information Sciences Institute / University of Southern California / Department of Computer Science and Engineering Technical Report / Massachusetts Institute of Technology / Computer Science Department / /

Person

Clifford Neuman / Boris Dragovic / Paul Barham / Steven Hand / Alex Ho / M. D. Schroeder / D. Schroeder / Jerome H. Saltzer / B. Clifford Neuman / Tim Harris / /

Position

director / Virtual System Model / principal designer / /

ProvinceOrState

Southern California / Massachusetts / /

PublishedMedium

Communications of the ACM / /

Region

Southern California / /

Technology

communicating processors / operating system / Operating Systems / virtualization technologies / /

SocialTag