Results 231 to 240 of about 160,167 (287)
Some of the next articles are maybe not open access.

Trusted computing

netWorker, 2006
Will the open, unrestricted PC soon become a thing of the past?
openaire   +1 more source

Trusted Computing

2009
Computer attacks of all sorts are commonplace in today’s interconnected, globalized society. A computer worm, written and released in one part of the world, can now traverse cyberspace in mere minutes creating havoc and untold financial hardship and loss.
openaire   +2 more sources

Trusting Computers Through Trusting Humans

International Journal of Technology and Human Interaction, 2007
This article considers the question of how we may trust automatically generated program code. The code walkthroughs and inspections of software engineering mimic the ways that mathematicians go about assuring themselves that a mathematical proof is true.
Alison Adam, Paul Spedding
openaire   +1 more source

Protected Computing vs. Trusted Computing

2006 1st International Conference on Communication Systems Software & Middleware, 2006
The Trusted Computing initiative represents an important effort towards more secure and dependable computers and therefore towards the security of all computer-supported infrastructures and processes. However, the Trusted Computing paradigm entails some risks and drawbacks that are by no means negligible.
A. Mana, A. Munoz
openaire   +1 more source

Trusted Computing Management Server Making Trusted Computing User Friendly

2009
Personal Computers (PC) with build in Trusted Computing (TC) technology are already well known and widely distributed. Nearly every new business notebook contains now a Trusted Platform Module (TPM) and could be used with increased trust and security features in daily application and use scenarios.
Sönke Sothmann, Sumanta Chaudhuri
openaire   +1 more source

Trusted Cloud Computing

2014
This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework.
Jakel, Rene   +6 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy