[go: up one dir, main page]

IPsec, 2013 - Google Patents

Microsoft Windows Common Criteria Evaluation

IPsec, 2013

View PDF
Document ID
12025656752175863927
Author
IPsec V
Publication year

External Links

Snippet

The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on …
Continue reading at www.commoncriteriaportal.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/107Computer aided management of electronic mail
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/109Time management, e.g. calendars, reminders, meetings, time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • G06Q30/0241Advertisement
    • G06Q30/0251Targeted advertisement

Similar Documents

Publication Publication Date Title
US10509914B1 (en) Data policy implementation in a tag-based policy architecture
US7797544B2 (en) Attesting to establish trust between computer entities
Kostiainen et al. On-board credentials with open provisioning
JP5860815B2 (en) System and method for enforcing computer policy
KR100879907B1 (en) Methods and Systems for Security of Computing Devices
US20220114249A1 (en) Systems and methods for secure and fast machine learning inference in a trusted execution environment
Armknecht et al. An efficient implementation of trusted channels based on OpenSSL
JP2010514000A (en) Method for securely storing program state data in an electronic device
CN116781359A (en) Portal security design method using network isolation and cryptograph
Englund et al. Secure acceleration on cloud-based FPGAs–FPGA enclaves
Hamidy et al. TC4SE: a high-performance trusted channel mechanism for secure enclave-based trusted execution environments
Fotiadis et al. Root-of-Trust abstractions for symbolic analysis: Application to attestation protocols
IPsec Microsoft Windows Common Criteria Evaluation
Huang et al. An effective approach for remote attestation in trusted computing
Gallery et al. A property-dependent agent transfer protocol
Pontes et al. Multi-Platform and Vault-Free Attestation of Confidential VMs
Shang et al. CCxTrust: Confidential Computing Platform Based on TEE and TPM Collaborative Trust
Walsh TLS with trustworthy certificate authorities
Heeb et al. Crypto Agility: Transition to post-quantum safe algorithms for secure key exchange and certificate generation
Voit et al. RFC 9683: Remote Integrity Verification of Network Devices Containing Trusted Platform Modules
Lindskog et al. Secure acceleration on cloud-based FPGAs--FPGA enclaves
Saravanan et al. Automated policy based remote attestation in trusted computing
Catuogno et al. Guaranteeing dependency enforcement in software updates
Raval et al. Hardware Root of Trust on IoT Gateway
Linux et al. FIPS 140-2 Non-Proprietary Security Policy