Back to Results
First PageMeta Content
Crime prevention / National security / Electronic commerce / Secure communication / Ring / Operating system / Trusted path / Multilevel security / Trusted system / Computer security / Security / Computer network security


The Trusted Function in Secure Decentralized Processing
Add to Reading List

Document Date: 2003-03-19 14:04:01


Open Document

File Size: 1,06 MB

Share Result on Facebook

Company

Storkts / MITRE Corporation / TR E Corporation / /

Event

FDA Phase / /

IndustryTerm

distinct security systems / decentralized processing case / responsible software / decentralized processing system / data networks / secure networks / communications network / secure network protocols / computer processing domain / decentralized processing setting / secure systems / multiplexed processing system / network / link-encrypted packet switch network / possible solution / lower level protocols / normal device / present ccxnputersecurity systems / connection protocol / internet protocol / secure data network / decentralized processing network / isolated hardware / message level protocol / program processor / trust network / security systems / decentralized processing / present technological solution / secure network / lower network protocols / ad hoc solution / singlelocation systems / /

Organization

Defense Advanced Research Projects Agency / Department of Defense / United States Government / /

Person

J. K. Millen / S. R. Ames / Jr. / J. G. Keeton-Williams / /

Position

domain custodian / author / custodian / Prime Minister / ACKNOWLEDGEMENT The author / access controller / TRUST CONTROLLER / scheduler / trustee / proprietor / representing trustee / controller / /

Product

Network / /

ProvinceOrState

Massachusetts / /

Technology

encryption / interconnected processors / lower level protocols / Cryptography / Network Protocol / message level protocol / internet protocol / Massachusetts The information processors / secure network protocols / virtual memory / program processor / lower network protocols / connection protocol / link encryption / /

SocialTag