Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Trustworthy computing 36 found (49 total)

alternate case: trustworthy computing

Microsoft Security Development Lifecycle (326 words) [view diff] no match in snippet view article find links to article

The Microsoft Security Development Lifecycle (SDL) is the approach Microsoft uses to integrate security into DevOps processes (sometimes called a DevSecOps
Max Planck Institute for Software Systems (517 words) [view diff] case mismatch in snippet view article find links to article
was succeeded by the International Max Planck Research School on Trustworthy Computing (in cooperation with Computer Science Department at Saarland University
Fred Cate (704 words) [view diff] case mismatch in snippet view article find links to article
Cyber Resilience. Previously, he served as a member of Microsoft's Trustworthy Computing Academic Advisory Board, Intel's Privacy and Security External Advisory
Windows Metafile vulnerability (2,567 words) [view diff] case mismatch in snippet view article find links to article
Ilfak Guilfanov. ^ Trustworthy Computing, SANS Institute Internet Storm Center. ^ Ilfak to the rescue!, F-Secure. ^ Trustworthy Computing, Slashdot. Linking
Microsoft Windows (8,766 words) [view diff] exact match in snippet view article find links to article
Internet use was less prevalent. In a 2002 strategy memo entitled "Trustworthy computing" sent to every Microsoft employee, Bill Gates declared that security
Dick Costolo (1,065 words) [view diff] case mismatch in snippet view article find links to article
Committee, along with the Corporate Vice President of Microsoft's Trustworthy Computing Group, Scott Charney, and McAfee President of Security David DeWalt
Locality-sensitive hashing (4,012 words) [view diff] case mismatch in snippet view article find links to article
Yanggui (2013). TLSH - a locality sensitive hash. 4th Cybercrime and Trustworthy Computing Workshop. pp. 7–13. doi:10.1109/CTC.2013.9. ISBN 978-1-4799-3076-0
Max Planck Institute for Informatics (406 words) [view diff] case mismatch in snippet view article find links to article
in Dagstuhl Castle International Max Planck Research School on Trustworthy Computing (IMPRS-TRUST) 49°15′28″N 7°2′44″E / 49.25778°N 7.04556°E / 49
Frank Dellaert (634 words) [view diff] case mismatch in snippet view article find links to article
with $1 million to advance research relevant to Virtual Earth and Trustworthy Computing". Archived from the original on 2007-05-15. Retrieved 2009-04-29
Homomorphic encryption (4,324 words) [view diff] case mismatch in snippet view article find links to article
homomorphic encryption on torus". GitHub. Retrieved 1 November 2019. Trustworthy Computing (TwC) Group. "A Multi-GPU Implementation of the CGGI Cryptosystem"
Frank Pfenning (315 words) [view diff] exact match in snippet view article find links to article
logic and type theory, logical frameworks, automated deduction, and trustworthy computing. He is one of the principal authors of the Twelf system. He also
NX bit (1,182 words) [view diff] case mismatch in snippet view article find links to article
AMD, Intel put antivirus tech into chips Microsoft Interviewed on Trustworthy Computing and NX LKML NX Announcement Changes to Functionality in Microsoft
Akinori Yonezawa (1,944 words) [view diff] case mismatch in snippet view article find links to article
Furthermore, since 2006, he has served as a member of the TCAAB (Trustworthy Computing Academic Advisory Board) at Microsoft headquarters (Redmond, Washington)
Gernot Heiser (1,535 words) [view diff] exact match in snippet view article find links to article
Ihor; Klein, Gerwin; Petters, Stefan M. (July 2007). "Towards trustworthy computing systems: Taking microkernels to the next level". ACM Operating Systems
W. Keith Edwards (538 words) [view diff] case mismatch in snippet view article find links to article
and is currently serving as a member of Microsoft Corporation's Trustworthy Computing Advisory Board. Keith also teaches a class on User Interface Software
Nilsimsa Hash (377 words) [view diff] case mismatch in snippet view article find links to article
(2013). "TLSH - A Locality Sensitive Hash". 4th Cybercrime and Trustworthy Computing Workshop. Retrieved 2015-06-04. Jesse Kornblum (15 May 2008). "The
ILLIAC (1,996 words) [view diff] case mismatch in snippet view article find links to article
2010. Retrieved May 14, 2014. "Trusted ILLIAC Pushes the Limits of Trustworthy Computing" (PDF). On Our Watch. Vol. 1, no. 1. Office of the Chancellor, University
Direct Anonymous Attestation (1,196 words) [view diff] case mismatch in snippet view article find links to article
Security for DAA Schemes". 3rd International Conference on Trust and Trustworthy Computing. 5324: 156–175. Chen; Morrissey; Smart (2008). "Pairings in Trusted
Emin Gün Sirer (1,058 words) [view diff] exact match in snippet view article find links to article
Emin Gün; Schneider, B. (2005). "Nexus: A new operating system for trustworthy computing". ACM Press: 1–9. CiteSeerX 10.1.1.72.340. {{cite journal}}: Cite
Adrian Perrig (879 words) [view diff] exact match in snippet view article find links to article
hardware-based approaches leveraging the newly deployed TPM chip for trustworthy computing. The Flicker and TrustVisor systems (available open-source) were
Embedded hypervisor (2,368 words) [view diff] case mismatch in snippet view article find links to article
Your System Secure? [9] Archived 2011-09-02 at the Wayback Machine Trustworthy Computing Systems [10] Improving IPC by Kernel Design Heiser, Gernot (27 November
Network effect (6,287 words) [view diff] exact match in snippet view article find links to article
S2CID 67868560. Lu, Yueming; Wu, Xu; Zhang, Xi, eds. (19 June 2015). Trustworthy computing and services : International Conference, ISCTCS 2014, Beijing, China
Cypherpunk (5,270 words) [view diff] case mismatch in snippet view article find links to article
engineer, leader of Microsoft's security efforts on Windows, Azure and Trustworthy Computing, CISO at Electronic Arts Timothy C. May (deceased): former Assistant
Hash function (7,844 words) [view diff] case mismatch in snippet view article find links to article
-- A Locality Sensitive Hash" (PDF). 2013 Fourth Cybercrime and Trustworthy Computing Workshop. IEEE. pp. 7–13. doi:10.1109/ctc.2013.9. ISBN 978-1-4799-3076-0
Attack Surface Analyzer (1,696 words) [view diff] case mismatch in snippet view article find links to article
for application security Vulnerabilities and Attack Surface The Trustworthy Computing Security Development Lifecycle (MSDN Article) SDL tools ASA release
East China Normal University (3,229 words) [view diff] case mismatch in snippet view article find links to article
Urbanization and Ecological Restoration Shanghai Key Laboratory of Trustworthy Computing Institute of Curriculum and Instruction Institute of Modern Chinese
Mozilla Corporation (4,619 words) [view diff] case mismatch in snippet view article find links to article
2007, Jeff Jones (a "security strategy director" in Microsoft's Trustworthy Computing Group) criticized Firefox, claiming that Internet Explorer experienced
Fuzzy hashing (815 words) [view diff] case mismatch in snippet view article find links to article
-- A Locality Sensitive Hash" (PDF). 2013 Fourth Cybercrime and Trustworthy Computing Workshop. IEEE. pp. 7–13. doi:10.1109/ctc.2013.9. ISBN 978-1-4799-3076-0
Howard Schmidt (1,811 words) [view diff] case mismatch in snippet view article find links to article
and chief security officer (CSO). He was the co-founder of the Trustworthy Computing Security Strategies Group. Schmidt served on the executive committee
Trust metric (3,323 words) [view diff] case mismatch in snippet view article find links to article
Paper). Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST), Springer [2]. Falcone, R., Pezzulo, G., and Castelfranchi
Institute for Information Infrastructure Protection (1,805 words) [view diff] exact match in snippet view article find links to article
expected to address a core area of cyber security research, including trustworthy computing, enterprise security management, secure systems engineering, network
Caspar Bowden (2,709 words) [view diff] case mismatch in snippet view article find links to article
Office, UK in 2005. In 2007, Bowden lead "the privacy pillar of the Trustworthy Computing initiative across Europe, Middle-East and Africa for Microsoft"
Physical unclonable function (4,114 words) [view diff] case mismatch in snippet view article find links to article
"Side Channel Analysis of PUFs and Fuzzy Extractors", Trust and Trustworthy Computing. 4th International Conference, TRUST 2011, Pittsburgh, PA, USA,
Cris Thomas (2,761 words) [view diff] case mismatch in snippet view article find links to article
securityintelligence.com. IBM. Retrieved 10 Dec 2017. "The Washington Area Trustworthy Computing Hour (WATCH) seminar series". nsf.gov. National Science Foundation
Cyber insurance (4,546 words) [view diff] case mismatch in snippet view article find links to article
"Can Competitive Insurers Improve Network Security?". Trust and Trustworthy Computing. Lecture Notes in Computer Science. Vol. 6101. pp. 308–322. doi:10
List of fellows of IEEE Computer Society (104 words) [view diff] exact match in snippet view article find links to article
medical image computing 2009 Fred Schneider For contributions to trustworthy computing, fault-tolerance and formal methods 2021 Eve Schooler For contributions