Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

Longer titles found: Controlled Access Protection Profile (view)

searching for Protection Profile 13 found (24 total)

alternate case: protection Profile

Multilevel security (4,178 words) [view diff] case mismatch in snippet view article find links to article

control protection profile (RBACPP) and labeled security protection profile (LSPP)) to a kernel that is not evaluated to an MLS-capable protection profile. Those
CEN Workshop Agreement (175 words) [view diff] exact match in snippet view article find links to article
signatures — Part 2: cryptographic module for CSP signing operations — Protection Profile (MCSO-PP) CWA 14169[dead link] (March 2004): secure signature creation
Trusted Platform Module (6,592 words) [view diff] exact match in snippet view article find links to article
1007/978-1-4302-6584-9. ISBN 978-1430265832. S2CID 27168869. "PC Client Protection Profile for TPM 2.0 – Trusted Computing Group". trustedcomputinggroup.org
Trusted operating system (395 words) [view diff] exact match in snippet view article find links to article
the Security Functional Requirements (SFRs) for Labeled Security Protection Profile (LSPP) and mandatory access control (MAC). The Common Criteria is
Secure element (496 words) [view diff] exact match in snippet view article find links to article
embedded software meet the requirements of the Security IC Platform Protection Profile [PP 0084] including resistance to physical tampering scenarios described
Separation kernel (873 words) [view diff] exact match in snippet view article find links to article
S. National Security Agency (NSA) published the Separation Kernel Protection Profile (SKPP), a security requirements specification for separation kernels
Hardware security module (1,557 words) [view diff] exact match in snippet view article find links to article
internationally recognized standards such as Common Criteria (e.g. using Protection Profile EN 419 221-5, "Cryptographic Module for Trust Services") or FIPS 140
Printer Working Group (680 words) [view diff] exact match in snippet view article find links to article
develop and maintain the current Hardcopy Device (HCD) Collaborative Protection Profile (cPP). In February 1990, the IETF Network Printing Protocol working
Trusted Solaris (506 words) [view diff] case mismatch in snippet view article find links to article
option. Common Criteria evaluations that include the labeled security protection profile were performed for: Oracle Solaris 10 11/06 at EAL4+, Oracle Solaris
Privilege revocation (computing) (198 words) [view diff] exact match in snippet view article
Revocation of privileges is a technique of defensive programming. Protection Profile for Privilege-Directed Content Authoriszor Ltd, Ref: Auth_CC/PP/DES/01
Ketogenic diet (10,274 words) [view diff] case mismatch in snippet view article find links to article
seizures. It is protective in many of these models and has a different protection profile than any known anticonvulsant. Conversely, fenofibrate, not used clinically
RED OS (1,407 words) [view diff] case mismatch in snippet view article find links to article
for compliance with the requirements of the Type A operating system protection profile of the fourth IT OS protection class.A4.PZ. Red Soft has been developing
EN 50436 (2,393 words) [view diff] exact match in snippet view article find links to article
50436-2. This standard has been developed on the basis of the Dutch "Protection Profile" for alcohol interlocks, which is listed under "Common Criteria for