XTS-400

Results: 51



#Item
11ISO standards / Computer network security / Common Criteria / Crime prevention / National security / Public safety / XTS-400 / Security / Evaluation / Computer security

Microsoft Word - CC Part 2

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2012-09-27 10:39:50
12Common Criteria / Protection Profile / Security Target / Cryptographic Module Testing Laboratory / XTS-400 / Evaluation / Computer security / Security

Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model June 2005

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
13National Information Assurance Partnership / Security Target / Thought / Ethics / XTS-400 / Evaluation Assurance Level / Evaluation / Computer security / Common Criteria

National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme ® TM

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2010-01-22 15:00:38
14National Security Agency / Trusted computing base / Mandatory access control / System call / Security-Enhanced Linux / Kernel / JavaScript / XTS-400 / Computer security / Computing / Software

The Case for Abstracting Security Policies   

Add to Reading List

Source URL: anil.recoil.org

Language: English
15Trusted Computer System Evaluation Criteria / Trusted computing / CTCPEC / ITSEC / Trusted computing base / Mandatory access control / Common Criteria / XTS-400 / Computer security / Evaluation / National Security Agency

A Comparison of Computer Security Evaluation Criteria[removed]Software Engineering Thesis Michael Papasimeon

Add to Reading List

Source URL: speakerd.s3.amazonaws.com

Language: English - Date: 2015-01-07 00:22:22
16Crime prevention / National security / Computer network security / Trusted system / Cryptographic hash function / Cryptographic engineering / XTS-400 / Security / Cryptography / Computer security

A Cryptographically-Based Operating System Security Model That Protects against Privileged Attackers Christian Payne This thesis is presented for the

Add to Reading List

Source URL: researchrepository.murdoch.edu.au

Language: English - Date: 2011-02-17 01:18:57
17Software architecture / Operating system / X Window System / Graphical user interfaces / Desktop environment / Server / AmigaOS / XTS-400 / Symbian / Software / System software / Computing

Securing Graphical User Interfaces Dissertation zur Erlangung des akademischen Grades Doktoringenieur (Dr.-Ing.) vorgelegt an der

Add to Reading List

Source URL: os.inf.tu-dresden.de

Language: English - Date: 2009-09-17 12:26:46
18Evaluation Assurance Level / Protection Profile / Security Target / Trusted computing base / Trusted Computer System Evaluation Criteria / ITSEC / XTS-400 / Cimcor / Computer security / Evaluation / Common Criteria

Common Criteria Common Criteria for Information Technology Security Evaluation

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2011-10-24 08:38:46
19ISO standards / Computer network security / Common Criteria / Crime prevention / National security / Public safety / XTS-400 / Security / Evaluation / Computer security

Microsoft Word - CC Part 2

Add to Reading List

Source URL: www.fmv.se

Language: English - Date: 2012-10-15 09:32:45
20Computer network security / Crime prevention / National security / Multilevel security / Trusted computing / XTS-400 / Mandatory access control / Multiple single-level / Cloud computing / Computer security / Computing / Security

Microsoft Word - MYSEA-MILCOM10-Final.docx

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2010-11-15 16:52:58
UPDATE