Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

Longer titles found: Trusted Computing Group (view), Trusted computing base (view)

searching for Trusted Computing 50 found (154 total)

alternate case: trusted Computing

Chain of trust (465 words) [view diff] no match in snippet view article find links to article

In computer security, a chain of trust is established by validating each component of hardware and software from the end entity up to the root certificate
Trusted Computer System Evaluation Criteria (2,101 words) [view diff] exact match in snippet view article find links to article
completeness for reference monitors have been implemented in the Trusted Computing Base (TCB). Security Testing automatically generates test-case from
Blacker (security) (273 words) [view diff] no match in snippet view article
Blacker (styled BLACKER) is a U.S. Department of Defense computer network security project designed to achieve A1 class ratings (very high assurance) of
Confidential Consortium Framework (549 words) [view diff] exact match in snippet view article find links to article
Microsoft Research. Retrieved 2023-02-20. "FOSDEM 2020 - Hardware-aided Trusted Computing devroom". archive.fosdem.org. "GitHub - microsoft/CCF: Confidential
ISO/IEC 19770 (1,283 words) [view diff] exact match in snippet view article find links to article
Center of Excellence National Institute for Standards and Technology Trusted Computing Group ITAM.ORG - Organization for IT Asset Management Professionals
VeraCrypt (3,203 words) [view diff] exact match in snippet view article find links to article
original on June 11, 2014. Retrieved December 18, 2013. Autonomic and Trusted Computing: 4th International Conference (Google Books). ATC. 2007. ISBN 9783540735465
Storage security (1,424 words) [view diff] exact match in snippet view article find links to article
http://www.snia.org/tls Trusted Computing Group, Storage Architecture Core Specification, Version 2.0, November 2011 Trusted Computing Group, Storage Security
Hardware performance counter (463 words) [view diff] case mismatch in snippet view article find links to article
programs" (PDF). Proceedings of the sixth ACM workshop on Scalable trusted computing. pp. 71–76. doi:10.1145/2046582.2046596. ISBN 9781450310017. S2CID 16409864
Windows Hardware Engineering Conference (890 words) [view diff] exact match in snippet view article find links to article
Archived from the original on 2008-05-13. Retrieved 2008-12-04. "Trusted Computing group past events". Archived from the original on October 3, 2006
Easter egg (media) (5,453 words) [view diff] exact match in snippet view article
could also bypass testing. Kabay asserts that this undermined the Trusted Computing Base, a paradigm of trustworthy hardware and software in place since
Content Security Policy (1,780 words) [view diff] exact match in snippet view article find links to article
Application Security Working Group considers such script to be part of the Trusted Computing Base implemented by the browser; however, it has been argued to the
Center for Advanced Security Research Darmstadt (619 words) [view diff] exact match in snippet view article find links to article
Enterprise Rights Management Data Privacy and Copyright IT Forensics Trusted Computing Security of Embedded systems Security of RFIDs and Chipcards Self-healing
End-to-end encryption (2,810 words) [view diff] exact match in snippet view article find links to article
with key exfiltration with malware, one approach is to split the Trusted Computing Base behind two unidirectionally connected computers that prevent
Ragel (589 words) [view diff] exact match in snippet view article find links to article
18 May 2018. Liqun Chen, Chris J. Mitchell, Andrew Martin (2009) Trusted Computing: Second International Conference, Trust 2009 Oxford, UK, April 6–8
OSF/1 (1,623 words) [view diff] case mismatch in snippet view article find links to article
architecture incorporating the OSF Mach MK++ kernel, introducing a trusted computing base layer consisting of trusted server components, hosting an application
Helmut Reimer (460 words) [view diff] no match in snippet view article find links to article
Europe 2003 Conference books.google.lu TeleTrusT: Anwendung einer vertrauenswürdigen Trusted-Computing-Technologie (in German) Springer 1 October 2006
KOMDIV-64 (958 words) [view diff] exact match in snippet view article find links to article
Aryashev, Sergei (2017). "High-Performance Microprocessor 1890BM118 for Trusted Computing Systems" (PDF). Software & Systems (in Russian). 30 (3): 345–352.
Frama-C (681 words) [view diff] exact match in snippet view article find links to article
Benjamin Monate; Julien Signoles (2008). "Slicing for Security of Code". Trusted Computing - Challenges and Applications. Lecture Notes in Computer Science.
Hypervisor (2,766 words) [view diff] exact match in snippet view article find links to article
Rani; Alkassar, Ammar. Complementary and Alternative Technologies to Trusted Computing (TC-Erg./-A.), Part 1, A study on behalf of the German Federal Office
Language-based system (371 words) [view diff] case mismatch in snippet view article find links to article
Semantic remote attestation—a virtual machine directed approach to trusted computing USENIX Virtual Machine Research and Technology Symposium, 2004 Giacobazzi
PrivateCore (610 words) [view diff] case mismatch in snippet view article find links to article
vCage supports a number of use cases including creating OpenStack trusted computing pools as well as protecting x86 servers in co-location and bare-metal
Power ISA (2,277 words) [view diff] case mismatch in snippet view article find links to article
generator, hardware-assisted garbage collection and hardware-enforced trusted computing. The spec was revised in March 2017 to the Power ISA v.3.0 B spec
Type enforcement (610 words) [view diff] case mismatch in snippet view article find links to article
to Hierarchical Integrity Policies, In Proceedings of the 8th National Computer Security Conference, page 18, 1985. LOCK - A trusted computing system
Bundling of Microsoft Windows (3,334 words) [view diff] exact match in snippet view article find links to article
2011). "UEFI secure booting". Anderson, Ross (September 20, 2011). "Trusted Computing 2.0". Leyden, John (September 21, 2011). "Windows 8 secure boot would
ProVerif (1,382 words) [view diff] case mismatch in snippet view article find links to article
and Backes, Maffei & Unruh analyse the anonymity properties of the trusted computing scheme Direct Anonymous Attestation (DAA) using observational equivalence
Infoblox (1,377 words) [view diff] exact match in snippet view article find links to article
IP services,” NetworkWorld, November 3, 2003, retrieved 11/27/13. Trusted Computing Group Members list,(contributors), retrieved 11/1/13 "Infoblox Joins
Valve Anti-Cheat (2,713 words) [view diff] exact match in snippet view article find links to article
Muller-Schloer, Christian; Hua, Yu (July 2, 2007). Autonomic and Trusted Computing: 4th International Conference, ATC 2007, Hong Kong, China, July 11-13
Proof of work (2,758 words) [view diff] case mismatch in snippet view article find links to article
protocol for tracking transfers of coins, rather than the hardware trusted computing function used by RPoW. Bitcoin has better trustworthiness because
Merchant plug-in (256 words) [view diff] exact match in snippet view article find links to article
G. "Augmenting Internet-based Card Not Present Transactions with Trusted Computing" (PDF). Retrieved 2008-09-25. {{cite journal}}: Cite journal requires
Peter Biddle (1,002 words) [view diff] exact match in snippet view article find links to article
Music Initiative (SDMI), Copy Protection Technical Working Group, and Trusted Computing Platform Alliance, an early technical evangelist for DVD and digital
Write-only memory (engineering) (1,422 words) [view diff] case mismatch in snippet view article
(PDF) on 2014-02-24. Retrieved 2014-02-19. Angelos D. Keromytis, "Trusted computing platforms and secure operting systems", in: Markus Jakobsson and Steven
Peer-to-peer (6,865 words) [view diff] case mismatch in snippet view article find links to article
Zhang, X. (2005). "Peer-to-peer access control architecture using trusted computing technology". Proceedings of the tenth ACM symposium on Access control
ShoppyBag (236 words) [view diff] exact match in snippet view article find links to article
Javier García; Li, Andy Xiaolin; Wang, Yan (2011-08-19). Autonomic and Trusted Computing: 8th International Conference, ATC 2011, Banff, Canada, September
IBM AIX (5,592 words) [view diff] exact match in snippet view article find links to article
in a Logical Partition on POWER4 The L stands for Linux affinity Trusted Computing Base (TCB) Support for mirroring with striping AIX 4.3.3, September
Multiple single-level (2,487 words) [view diff] case mismatch in snippet view article find links to article
meaningful and those where they are not (rigorously avoiding the term "trusted computing base" [TCB]); the list goes on. One readily perceives that the MLS
Ensemble learning (6,612 words) [view diff] exact match in snippet view article find links to article
"Malicious Codes Detection Based on Ensemble Learning". Autonomic and Trusted Computing. Lecture Notes in Computer Science. Vol. 4610. pp. 468–477. doi:10
Adrian Perrig (879 words) [view diff] case mismatch in snippet view article find links to article
open-source) were important early systems that guided attestation-based trusted computing research. With Bryan Parno and Jon McCune, Perrig published the introductory
Network telescope (1,444 words) [view diff] exact match in snippet view article find links to article
Network Telescope project. ... Support for this work is provided by NSF Trusted Computing Grant CCR-0311690, Cisco Systems University Research Program, DARPA
Live distributed object (2,218 words) [view diff] exact match in snippet view article find links to article
Communication System for Scalable Trust', First ACM Workshop on Scalable Trusted Computing (ACM STC 2006), Fairfax, VA, November 2006, http://portal.acm.org/citation
Extensible Storage Engine (5,525 words) [view diff] exact match in snippet view article find links to article
Directory and became part of a special set of Windows code called the Trusted Computing Base (TCB). The number of Microsoft applications using JET Blue continues
Verifiable computing (1,887 words) [view diff] exact match in snippet view article find links to article
Using Secure Coprocessors (PhD thesis). Carnegie Mellon University. Trusted Computing Group (July 2007). Trusted platform module main specification. 1.2
GSOAP (2,328 words) [view diff] case mismatch in snippet view article find links to article
Safford, David; Van Doorn, Leendert (2007). A practical guide to trusted computing. Pearson Education. Getting started with gSOAP project page on SourceForge
FOSDEM (2,508 words) [view diff] exact match in snippet view article find links to article
RISC-V; Retrocomputing; LLVM toolchain; X.Org/Graphics; Hardware-aided Trusted Computing; Confidential Consortium Framework; Open Source Firmware, BMC and
Control register (1,634 words) [view diff] exact match in snippet view article find links to article
Stephen (2011-09-21). "Supervisor Mode Execution Protection" (PDF). NSA Trusted Computing Conference 2011. National Conference Services, Inc. Archived from
National Security Agency (22,318 words) [view diff] case mismatch in snippet view article find links to article
Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications. The Rainbow books were replaced
Virgil D. Gligor (2,307 words) [view diff] exact match in snippet view article find links to article
consultant to Burroughs and IBM corporations. He served on Microsoft’s Trusted Computing Academic Advisory Board and SAP’s Security Advisory Board. He has
Outline of computer security (5,291 words) [view diff] case mismatch in snippet view article find links to article
information security issues such as cryptography, network security, trusted computing, software reliability, privacy, and internet governance. Oulu University
List of important publications in computer science (5,931 words) [view diff] case mismatch in snippet view article find links to article
to understand containment of malicious code, as well as aspects of trusted computing. Dennis M. Ritchie and Ken Thompson Communications of the ACM 17(7)
Identity replacement technology (3,950 words) [view diff] case mismatch in snippet view article find links to article
performing tests on different virtual environments such as cloud and trusted computing. One study formed a system of obfuscation operators called Olympus
Spatial cloaking (6,851 words) [view diff] exact match in snippet view article find links to article
International Conference on Networks Security, Wireless Communications and Trusted Computing. Vol. 2. pp. 468–471. doi:10.1109/NSWCTC.2010.243. ISBN 978-1-4244-6597-2