×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [high assurance]
CAN CLOUD COMPUTING SYSTEMS OFFER HIGH ASSURANCE WITHOUT LOSING KEY CLOUD PROPERTIES? Ken Birman, Cornell University CS6410 1
219 views
NRC Cyber Security Regulatory Program Development Background ANSI Nuclear Energy Standards Coordination Collaborative (NESCC) Meeting November 3, 2014November
217 views
Computer Science and Engineering, July 21, 2004 CSE CHAMPS Initiative Constructing High-Assurance Mobile and Pervasive Systems Department of Computer Science
218 views
SSL Security with Alpha Five App Server
32 views
NRC Cyber Security Regulatory Program Development Background
31 views
Trade Facilitation Risk Management: New Zealand’s Experience
35 views
S oftware E ngineering & N etwork S ystems Lab A Requirements Pattern-Driven Approach to Modeling and Analyzing Embedded Systems Betty H.C. Cheng Software
216 views
Least Privilege Separation Kernel (LPSK ) Accomplishments and Current Work
219 views
Public Key Infrastructure Levi Broderick April 18, 2006 05-899 / 17-500 – USABLE PRIVACY & SECURITY – CRANOR, HONG, REITER
218 views
MSTA/MCTM Leadership Conference February 5-6, 2010 Jean Howard, OPI Mathematics Specialist Katie Burke, OPI Science Specialist Judy Snow, OPI State Assessment
218 views
Federal Agencies and PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee
[email protected]
;
215 views
Pr êt à Voter A brief (heavily biased) history of verifiable voting
42 views
< Prev
Next >