Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

Longer titles found: Trusted Computing Group (view), Trusted computing base (view)

searching for Trusted Computing 49 found (156 total)

alternate case: trusted Computing

Chain of trust (465 words) [view diff] no match in snippet view article find links to article

In computer security, a chain of trust is established by validating each component of hardware and software from the end entity up to the root certificate
Trusted Computer System Evaluation Criteria (2,094 words) [view diff] exact match in snippet view article find links to article
completeness for reference monitors have been implemented in the Trusted Computing Base (TCB). Security Testing automatically generates test-case from
Blacker (security) (264 words) [view diff] no match in snippet view article
Blacker (styled BLACKER) is a U.S. Department of Defense computer network security project designed to achieve A1 class ratings (very high assurance) of
Confidential Consortium Framework (549 words) [view diff] exact match in snippet view article find links to article
Microsoft Research. Retrieved 2023-02-20. "FOSDEM 2020 - Hardware-aided Trusted Computing devroom". archive.fosdem.org. "GitHub - microsoft/CCF: Confidential
VeraCrypt (3,218 words) [view diff] exact match in snippet view article find links to article
original on June 11, 2014. Retrieved December 18, 2013. Autonomic and Trusted Computing: 4th International Conference (Google Books). ATC. 2007. ISBN 9783540735465
Windows Hardware Engineering Conference (892 words) [view diff] exact match in snippet view article find links to article
Archived from the original on 2008-05-13. Retrieved 2008-12-04. "Trusted Computing group past events". Archived from the original on October 3, 2006
Storage security (1,499 words) [view diff] exact match in snippet view article find links to article
http://www.snia.org/tls Trusted Computing Group, Storage Architecture Core Specification, Version 2.0, November 2011 Trusted Computing Group, Storage Security
Hardware performance counter (463 words) [view diff] case mismatch in snippet view article find links to article
programs" (PDF). Proceedings of the sixth ACM workshop on Scalable trusted computing. pp. 71–76. doi:10.1145/2046582.2046596. ISBN 9781450310017. S2CID 16409864
ISO/IEC 19770 (1,283 words) [view diff] exact match in snippet view article find links to article
Center of Excellence National Institute for Standards and Technology Trusted Computing Group ITAM.ORG - Organization for IT Asset Management Professionals
Easter egg (media) (5,633 words) [view diff] exact match in snippet view article
could also bypass testing. Kabay asserts that this undermined the Trusted Computing Base, a paradigm of trustworthy hardware and software in place since
Content Security Policy (1,779 words) [view diff] exact match in snippet view article find links to article
Application Security Working Group considers such script to be part of the Trusted Computing Base implemented by the browser; however, it has been argued to the
Ragel (594 words) [view diff] exact match in snippet view article find links to article
18 May 2018. Liqun Chen, Chris J. Mitchell, Andrew Martin (2009) Trusted Computing: Second International Conference, Trust 2009 Oxford, UK, April 6–8
Center for Advanced Security Research Darmstadt (620 words) [view diff] exact match in snippet view article find links to article
Enterprise Rights Management Data Privacy and Copyright IT Forensics Trusted Computing Security of Embedded systems Security of RFIDs and Chipcards Self-healing
OSF/1 (1,800 words) [view diff] case mismatch in snippet view article find links to article
architecture incorporating the OSF Mach MK++ kernel, introducing a trusted computing base layer consisting of trusted server components, hosting an application
Helmut Reimer (460 words) [view diff] no match in snippet view article find links to article
Europe 2003 Conference books.google.lu TeleTrusT: Anwendung einer vertrauenswürdigen Trusted-Computing-Technologie (in German) Springer 1 October 2006
KOMDIV-64 (958 words) [view diff] exact match in snippet view article find links to article
Aryashev, Sergei (2017). "High-Performance Microprocessor 1890BM118 for Trusted Computing Systems" (PDF). Software & Systems (in Russian). 30 (3): 345–352.
End-to-end encryption (3,144 words) [view diff] exact match in snippet view article find links to article
with key exfiltration with malware, one approach is to split the Trusted Computing Base behind two unidirectionally connected computers that prevent
Frama-C (769 words) [view diff] exact match in snippet view article find links to article
Benjamin Monate; Julien Signoles (2008). "Slicing for Security of Code". Trusted Computing - Challenges and Applications. Lecture Notes in Computer Science.
Peter Biddle (1,010 words) [view diff] exact match in snippet view article find links to article
Music Initiative (SDMI), Copy Protection Technical Working Group, and Trusted Computing Platform Alliance, an early technical evangelist for DVD and digital
Type enforcement (610 words) [view diff] case mismatch in snippet view article find links to article
to Hierarchical Integrity Policies, In Proceedings of the 8th National Computer Security Conference, page 18, 1985. LOCK - A trusted computing system
Hypervisor (2,946 words) [view diff] exact match in snippet view article find links to article
Rani; Alkassar, Ammar. Complementary and Alternative Technologies to Trusted Computing (TC-Erg./-A.), Part 1, A study on behalf of the German Federal Office
Bundling of Microsoft Windows (3,325 words) [view diff] exact match in snippet view article find links to article
2011). "UEFI secure booting". Anderson, Ross (September 20, 2011). "Trusted Computing 2.0". Leyden, John (September 21, 2011). "Windows 8 secure boot would
Power ISA (2,352 words) [view diff] case mismatch in snippet view article find links to article
generator, hardware-assisted garbage collection and hardware-enforced trusted computing. The spec was revised in March 2017 to the Power ISA v.3.0 B spec
PrivateCore (630 words) [view diff] case mismatch in snippet view article find links to article
vCage supports a number of use cases including creating OpenStack trusted computing pools as well as protecting x86 servers in co-location and bare-metal
Infoblox (1,080 words) [view diff] exact match in snippet view article find links to article
IP services,” NetworkWorld, November 3, 2003, retrieved 11/27/13. Trusted Computing Group Members list,(contributors), retrieved 11/1/13 "Infoblox Joins
Valve Anti-Cheat (2,731 words) [view diff] exact match in snippet view article find links to article
Muller-Schloer, Christian; Hua, Yu (July 2, 2007). Autonomic and Trusted Computing: 4th International Conference, ATC 2007, Hong Kong, China, July 11-13
Merchant plug-in (256 words) [view diff] exact match in snippet view article find links to article
G. "Augmenting Internet-based Card Not Present Transactions with Trusted Computing" (PDF). Retrieved 2008-09-25. {{cite journal}}: Cite journal requires
ProVerif (1,382 words) [view diff] case mismatch in snippet view article find links to article
and Backes, Maffei & Unruh analyse the anonymity properties of the trusted computing scheme Direct Anonymous Attestation (DAA) using observational equivalence
Language-based system (444 words) [view diff] case mismatch in snippet view article find links to article
Semantic remote attestation—a virtual machine directed approach to trusted computing USENIX Virtual Machine Research and Technology Symposium, 2004 Giacobazzi
Write-only memory (engineering) (1,424 words) [view diff] case mismatch in snippet view article
(PDF) on 2014-02-24. Retrieved 2014-02-19. Angelos D. Keromytis, "Trusted computing platforms and secure operating systems", in: Markus Jakobsson and
Adrian Perrig (879 words) [view diff] case mismatch in snippet view article find links to article
open-source) were important early systems that guided attestation-based trusted computing research. With Bryan Parno and Jon McCune, Perrig published the introductory
ShoppyBag (236 words) [view diff] exact match in snippet view article find links to article
Javier García; Li, Andy Xiaolin; Wang, Yan (2011-08-19). Autonomic and Trusted Computing: 8th International Conference, ATC 2011, Banff, Canada, September
NCP Engineering (632 words) [view diff] exact match in snippet view article find links to article
Retrieved 28 November 2016. "ESUKOM Demo: Automated Mobile Security". Trusted Computing Group. Retrieved 29 August 2024. "SIMU". simu-project.de. Retrieved
Proof of work (4,045 words) [view diff] case mismatch in snippet view article find links to article
protocol for tracking transfers of coins, rather than the hardware trusted computing function used by RPoW. Bitcoin has better trustworthiness because
Multiple single-level (2,487 words) [view diff] case mismatch in snippet view article find links to article
meaningful and those where they are not (rigorously avoiding the term "trusted computing base" [TCB]); the list goes on. One readily perceives that the MLS
IBM AIX (4,984 words) [view diff] exact match in snippet view article find links to article
in a Logical Partition on POWER4 The L stands for Linux affinity Trusted Computing Base (TCB) Support for mirroring with striping AIX 4.3.3, September
Ensemble learning (6,708 words) [view diff] exact match in snippet view article find links to article
"Malicious Codes Detection Based on Ensemble Learning". Autonomic and Trusted Computing. Lecture Notes in Computer Science. Vol. 4610. pp. 468–477. doi:10
Network telescope (1,442 words) [view diff] exact match in snippet view article find links to article
Network Telescope project. ... Support for this work is provided by NSF Trusted Computing Grant CCR-0311690, Cisco Systems University Research Program, DARPA
Peer-to-peer (6,924 words) [view diff] case mismatch in snippet view article find links to article
Zhang, X. (2005). "Peer-to-peer access control architecture using trusted computing technology". Proceedings of the tenth ACM symposium on Access control
Live distributed object (2,218 words) [view diff] exact match in snippet view article find links to article
Communication System for Scalable Trust', First ACM Workshop on Scalable Trusted Computing (ACM STC 2006), Fairfax, VA, November 2006, http://portal.acm.org/citation
Extensible Storage Engine (5,525 words) [view diff] exact match in snippet view article find links to article
Directory and became part of a special set of Windows code called the Trusted Computing Base (TCB). The number of Microsoft applications using JET Blue continues
Verifiable computing (1,887 words) [view diff] exact match in snippet view article find links to article
Using Secure Coprocessors (PhD thesis). Carnegie Mellon University. Trusted Computing Group (July 2007). Trusted platform module main specification. 1.2
GSOAP (2,328 words) [view diff] case mismatch in snippet view article find links to article
Safford, David; Van Doorn, Leendert (2007). A practical guide to trusted computing. Pearson Education. Getting started with gSOAP project page on SourceForge
Control register (1,706 words) [view diff] exact match in snippet view article find links to article
Stephen (2011-09-21). "Supervisor Mode Execution Protection" (PDF). NSA Trusted Computing Conference 2011. National Conference Services, Inc. Archived from
National Security Agency (24,653 words) [view diff] case mismatch in snippet view article find links to article
Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications. The Rainbow books were replaced
Virgil D. Gligor (2,304 words) [view diff] exact match in snippet view article find links to article
consultant to Burroughs and IBM corporations. He served on Microsoft’s Trusted Computing Academic Advisory Board and SAP’s Security Advisory Board. He has
Identity replacement technology (3,954 words) [view diff] case mismatch in snippet view article find links to article
performing tests on different virtual environments such as cloud and trusted computing. One study formed a system of obfuscation operators called Olympus
Spatial cloaking (6,863 words) [view diff] exact match in snippet view article find links to article
International Conference on Networks Security, Wireless Communications and Trusted Computing. Vol. 2. pp. 468–471. doi:10.1109/NSWCTC.2010.243. ISBN 978-1-4244-6597-2
Outline of computer security (5,240 words) [view diff] case mismatch in snippet view article find links to article
information security issues such as cryptography, network security, trusted computing, software reliability, privacy, and internet governance. Oulu University