Finest authorizing member of common criteria certification
暂无分享,去创建一个
Ali Dehghantanha | Jamalul-lail Ab Manan | Nur Izura Udzir | Ramlan Mahmod | Habibah Hashim | Mohd Anuar Mat Isa | Mar Yah Said | A. Dehghantanha | R. Mahmod | M. Isa | J. Manan | H. Hashim | N. Udzir | M. Said
[1] S Setapa,et al. Trusted computing based microkernel , 2010, 2010 International Conference on Computer Applications and Industrial Electronics.
[2] Zubair Ahmad Khattak,et al. Security, trust and privacy: a new direction for pervasive computing , 2011 .
[3] Jan Kallberg,et al. The Common Criteria Meets Realpolitik: Trust, Alliances, and Potential Betrayal , 2012, IEEE Security & Privacy.
[4] Vienna Lecture,et al. ON THE EUROPEAN UNION , 2010 .
[5] Paul Taylor,et al. From the United Nation , 1948, Social Service Review.
[6] Garrel Pottinger,et al. Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the U.S. Military , 1997, IEEE Ann. Hist. Comput..
[7] Richard W. Van Alstyne. The North Atlantic Treaty , 2022, George F. Kennan and the Making of American Foreign Policy, 1947-1950.
[8] Jamalul-lail Ab Manan,et al. An Approach to Establish Trusted Application , 2010, 2010 Second International Conference on Network Applications, Protocols and Services.
[9] Jim Hearn. Does the common criteria paradigm have a future? [security and privacy] , 2004, IEEE Security & Privacy Magazine.
[10] Mohd Anuar Mat Isa,et al. ESTABLISHING TRUSTED PROCESS IN TRUSTED COMPUTING PLATFORM , 2010 .
[11] Yusnani Mohd Yussoff,et al. Root of trust for trusted node based-on ARM11 platform , 2011, The 17th Asia Pacific Conference on Communications.
[12] Christof Heyns,et al. The African Union , 2003 .
[13] M. Razzazi,et al. Common Criteria Security Evaluation: A Time and Cost Effective Approach , 2006, 2006 2nd International Conference on Information & Communication Technologies.
[14] Steven B. Lipner,et al. Trusted Computer System Evaluation Criteria ( Orange Book ) December , 2001 .