Back to Results
First PageMeta Content
Trusted computing base / Mandatory access control / Trusted Computing / Microkernel / Ring / Kernel / Operating system / Trustworthy computing / Security kernel / Computer security / Security / Computing


/tardir/tiffs/a408429.tiff
Add to Reading List

Document Date: 2004-07-15 15:52:20


Open Document

File Size: 188,54 KB

Share Result on Facebook

City

Monterey / /

Company

Trusted Computing / /

Event

Reorganization / /

IndustryTerm

software engineering / workstation devices / malicious application software / trustworthy computing systems / crypto-separation device / potential applications / high confidence computing / primitive operating system services / software development tools / domain devices / target technologies / trustworthy computing / large complex systems / closed multilevel networks / workstation device / automated management / worked example / multilevel network / cryptographic services / interoperable tools / reference-implementationtrusted computing component / software mechanisms / predictable processing behavior / computing / assurance systems / assurance enabling technologies / stand-alone tools / user domain devices / coalition-enabled mobile devices / technology transfer / multilevel network router / /

Organization

National Park Service / Center for INFOSEC Studies / Naval Postgraduate School Center for Information Systems Security / US Government / Trusted Computer Platform Alliance / NAVAL POSTGRADUATE SCHOOL / Neil C. Rowe Professor Department of Computer Science Department / USE ONLY / Center for Information Systems Security Studies / /

Person

Cynthia E. Irvine Timothy / Timothy E. Levi / Cynthia E. Irvine / Timothy E. Levin George / Timothy E. Levin / George W. Dinolt / /

Position

AUTHOR / Dean of Research / architect / David R. Ellison Superintendent / communications controller / Admiral / /

ProgrammingLanguage

L / C / /

ProvinceOrState

California / /

PublishedMedium

the National / /

Technology

LAN / RAM / key enabling technologies / key high assurance enabling technologies / multilevel network router / operating system / shared memory / target technologies / mobile devices / /

SocialTag