language:
Find link is a tool written by Edward Betts.Longer titles found: Trusted Computing Group (view), Trusted computing base (view)
searching for Trusted Computing 49 found (156 total)
alternate case: trusted Computing
Chain of trust
(465 words)
[view diff]
no match in snippet
view article
find links to article
In computer security, a chain of trust is established by validating each component of hardware and software from the end entity up to the root certificateTrusted Computer System Evaluation Criteria (2,094 words) [view diff] exact match in snippet view article find links to article
completeness for reference monitors have been implemented in the Trusted Computing Base (TCB). Security Testing automatically generates test-case fromBlacker (security) (264 words) [view diff] no match in snippet view article
Blacker (styled BLACKER) is a U.S. Department of Defense computer network security project designed to achieve A1 class ratings (very high assurance) ofConfidential Consortium Framework (549 words) [view diff] exact match in snippet view article find links to article
Microsoft Research. Retrieved 2023-02-20. "FOSDEM 2020 - Hardware-aided Trusted Computing devroom". archive.fosdem.org. "GitHub - microsoft/CCF: ConfidentialVeraCrypt (3,218 words) [view diff] exact match in snippet view article find links to article
original on June 11, 2014. Retrieved December 18, 2013. Autonomic and Trusted Computing: 4th International Conference (Google Books). ATC. 2007. ISBN 9783540735465Windows Hardware Engineering Conference (892 words) [view diff] exact match in snippet view article find links to article
Archived from the original on 2008-05-13. Retrieved 2008-12-04. "Trusted Computing group past events". Archived from the original on October 3, 2006Storage security (1,499 words) [view diff] exact match in snippet view article find links to article
http://www.snia.org/tls Trusted Computing Group, Storage Architecture Core Specification, Version 2.0, November 2011 Trusted Computing Group, Storage SecurityHardware performance counter (463 words) [view diff] case mismatch in snippet view article find links to article
programs" (PDF). Proceedings of the sixth ACM workshop on Scalable trusted computing. pp. 71–76. doi:10.1145/2046582.2046596. ISBN 9781450310017. S2CID 16409864ISO/IEC 19770 (1,283 words) [view diff] exact match in snippet view article find links to article
Center of Excellence National Institute for Standards and Technology Trusted Computing Group ITAM.ORG - Organization for IT Asset Management ProfessionalsEaster egg (media) (5,633 words) [view diff] exact match in snippet view article
could also bypass testing. Kabay asserts that this undermined the Trusted Computing Base, a paradigm of trustworthy hardware and software in place sinceContent Security Policy (1,779 words) [view diff] exact match in snippet view article find links to article
Application Security Working Group considers such script to be part of the Trusted Computing Base implemented by the browser; however, it has been argued to theRagel (594 words) [view diff] exact match in snippet view article find links to article
18 May 2018. Liqun Chen, Chris J. Mitchell, Andrew Martin (2009) Trusted Computing: Second International Conference, Trust 2009 Oxford, UK, April 6–8Center for Advanced Security Research Darmstadt (620 words) [view diff] exact match in snippet view article find links to article
Enterprise Rights Management Data Privacy and Copyright IT Forensics Trusted Computing Security of Embedded systems Security of RFIDs and Chipcards Self-healingOSF/1 (1,800 words) [view diff] case mismatch in snippet view article find links to article
architecture incorporating the OSF Mach MK++ kernel, introducing a trusted computing base layer consisting of trusted server components, hosting an applicationHelmut Reimer (460 words) [view diff] no match in snippet view article find links to article
Europe 2003 Conference books.google.lu TeleTrusT: Anwendung einer vertrauenswürdigen Trusted-Computing-Technologie (in German) Springer 1 October 2006KOMDIV-64 (958 words) [view diff] exact match in snippet view article find links to article
Aryashev, Sergei (2017). "High-Performance Microprocessor 1890BM118 for Trusted Computing Systems" (PDF). Software & Systems (in Russian). 30 (3): 345–352.End-to-end encryption (3,144 words) [view diff] exact match in snippet view article find links to article
with key exfiltration with malware, one approach is to split the Trusted Computing Base behind two unidirectionally connected computers that preventFrama-C (769 words) [view diff] exact match in snippet view article find links to article
Benjamin Monate; Julien Signoles (2008). "Slicing for Security of Code". Trusted Computing - Challenges and Applications. Lecture Notes in Computer Science.Peter Biddle (1,010 words) [view diff] exact match in snippet view article find links to article
Music Initiative (SDMI), Copy Protection Technical Working Group, and Trusted Computing Platform Alliance, an early technical evangelist for DVD and digitalType enforcement (610 words) [view diff] case mismatch in snippet view article find links to article
to Hierarchical Integrity Policies, In Proceedings of the 8th National Computer Security Conference, page 18, 1985. LOCK - A trusted computing systemHypervisor (2,946 words) [view diff] exact match in snippet view article find links to article
Rani; Alkassar, Ammar. Complementary and Alternative Technologies to Trusted Computing (TC-Erg./-A.), Part 1, A study on behalf of the German Federal OfficeBundling of Microsoft Windows (3,325 words) [view diff] exact match in snippet view article find links to article
2011). "UEFI secure booting". Anderson, Ross (September 20, 2011). "Trusted Computing 2.0". Leyden, John (September 21, 2011). "Windows 8 secure boot wouldPower ISA (2,352 words) [view diff] case mismatch in snippet view article find links to article
generator, hardware-assisted garbage collection and hardware-enforced trusted computing. The spec was revised in March 2017 to the Power ISA v.3.0 B specPrivateCore (630 words) [view diff] case mismatch in snippet view article find links to article
vCage supports a number of use cases including creating OpenStack trusted computing pools as well as protecting x86 servers in co-location and bare-metalInfoblox (1,080 words) [view diff] exact match in snippet view article find links to article
IP services,” NetworkWorld, November 3, 2003, retrieved 11/27/13. Trusted Computing Group Members list,(contributors), retrieved 11/1/13 "Infoblox JoinsValve Anti-Cheat (2,731 words) [view diff] exact match in snippet view article find links to article
Muller-Schloer, Christian; Hua, Yu (July 2, 2007). Autonomic and Trusted Computing: 4th International Conference, ATC 2007, Hong Kong, China, July 11-13Merchant plug-in (256 words) [view diff] exact match in snippet view article find links to article
G. "Augmenting Internet-based Card Not Present Transactions with Trusted Computing" (PDF). Retrieved 2008-09-25. {{cite journal}}: Cite journal requiresProVerif (1,382 words) [view diff] case mismatch in snippet view article find links to article
and Backes, Maffei & Unruh analyse the anonymity properties of the trusted computing scheme Direct Anonymous Attestation (DAA) using observational equivalenceLanguage-based system (444 words) [view diff] case mismatch in snippet view article find links to article
Semantic remote attestation—a virtual machine directed approach to trusted computing USENIX Virtual Machine Research and Technology Symposium, 2004 GiacobazziWrite-only memory (engineering) (1,424 words) [view diff] case mismatch in snippet view article
(PDF) on 2014-02-24. Retrieved 2014-02-19. Angelos D. Keromytis, "Trusted computing platforms and secure operating systems", in: Markus Jakobsson andAdrian Perrig (879 words) [view diff] case mismatch in snippet view article find links to article
open-source) were important early systems that guided attestation-based trusted computing research. With Bryan Parno and Jon McCune, Perrig published the introductoryShoppyBag (236 words) [view diff] exact match in snippet view article find links to article
Javier García; Li, Andy Xiaolin; Wang, Yan (2011-08-19). Autonomic and Trusted Computing: 8th International Conference, ATC 2011, Banff, Canada, SeptemberNCP Engineering (632 words) [view diff] exact match in snippet view article find links to article
Retrieved 28 November 2016. "ESUKOM Demo: Automated Mobile Security". Trusted Computing Group. Retrieved 29 August 2024. "SIMU". simu-project.de. RetrievedProof of work (4,045 words) [view diff] case mismatch in snippet view article find links to article
protocol for tracking transfers of coins, rather than the hardware trusted computing function used by RPoW. Bitcoin has better trustworthiness becauseMultiple single-level (2,487 words) [view diff] case mismatch in snippet view article find links to article
meaningful and those where they are not (rigorously avoiding the term "trusted computing base" [TCB]); the list goes on. One readily perceives that the MLSIBM AIX (4,984 words) [view diff] exact match in snippet view article find links to article
in a Logical Partition on POWER4 The L stands for Linux affinity Trusted Computing Base (TCB) Support for mirroring with striping AIX 4.3.3, SeptemberEnsemble learning (6,708 words) [view diff] exact match in snippet view article find links to article
"Malicious Codes Detection Based on Ensemble Learning". Autonomic and Trusted Computing. Lecture Notes in Computer Science. Vol. 4610. pp. 468–477. doi:10Network telescope (1,442 words) [view diff] exact match in snippet view article find links to article
Network Telescope project. ... Support for this work is provided by NSF Trusted Computing Grant CCR-0311690, Cisco Systems University Research Program, DARPAPeer-to-peer (6,924 words) [view diff] case mismatch in snippet view article find links to article
Zhang, X. (2005). "Peer-to-peer access control architecture using trusted computing technology". Proceedings of the tenth ACM symposium on Access controlLive distributed object (2,218 words) [view diff] exact match in snippet view article find links to article
Communication System for Scalable Trust', First ACM Workshop on Scalable Trusted Computing (ACM STC 2006), Fairfax, VA, November 2006, http://portal.acm.org/citationExtensible Storage Engine (5,525 words) [view diff] exact match in snippet view article find links to article
Directory and became part of a special set of Windows code called the Trusted Computing Base (TCB). The number of Microsoft applications using JET Blue continuesVerifiable computing (1,887 words) [view diff] exact match in snippet view article find links to article
Using Secure Coprocessors (PhD thesis). Carnegie Mellon University. Trusted Computing Group (July 2007). Trusted platform module main specification. 1.2GSOAP (2,328 words) [view diff] case mismatch in snippet view article find links to article
Safford, David; Van Doorn, Leendert (2007). A practical guide to trusted computing. Pearson Education. Getting started with gSOAP project page on SourceForgeControl register (1,706 words) [view diff] exact match in snippet view article find links to article
Stephen (2011-09-21). "Supervisor Mode Execution Protection" (PDF). NSA Trusted Computing Conference 2011. National Conference Services, Inc. Archived fromNational Security Agency (24,653 words) [view diff] case mismatch in snippet view article find links to article
Criteria in a six-foot high Rainbow Series of books that detailed trusted computing and network platform specifications. The Rainbow books were replacedVirgil D. Gligor (2,304 words) [view diff] exact match in snippet view article find links to article
consultant to Burroughs and IBM corporations. He served on Microsoft’s Trusted Computing Academic Advisory Board and SAP’s Security Advisory Board. He hasIdentity replacement technology (3,954 words) [view diff] case mismatch in snippet view article find links to article
performing tests on different virtual environments such as cloud and trusted computing. One study formed a system of obfuscation operators called OlympusSpatial cloaking (6,863 words) [view diff] exact match in snippet view article find links to article
International Conference on Networks Security, Wireless Communications and Trusted Computing. Vol. 2. pp. 468–471. doi:10.1109/NSWCTC.2010.243. ISBN 978-1-4244-6597-2Outline of computer security (5,240 words) [view diff] case mismatch in snippet view article find links to article
information security issues such as cryptography, network security, trusted computing, software reliability, privacy, and internet governance. Oulu University