IPsec, 2013 - Google Patents
Microsoft Windows Common Criteria EvaluationIPsec, 2013
View PDF- Document ID
- 12025656752175863927
- Author
- IPsec V
- Publication year
External Links
Snippet
The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on …
- 238000011156 evaluation 0 title description 40
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/107—Computer aided management of electronic mail
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/109—Time management, e.g. calendars, reminders, meetings, time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
- G06Q30/0241—Advertisement
- G06Q30/0251—Targeted advertisement
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10509914B1 (en) | Data policy implementation in a tag-based policy architecture | |
US7797544B2 (en) | Attesting to establish trust between computer entities | |
Kostiainen et al. | On-board credentials with open provisioning | |
JP5860815B2 (en) | System and method for enforcing computer policy | |
KR100879907B1 (en) | Methods and Systems for Security of Computing Devices | |
US20220114249A1 (en) | Systems and methods for secure and fast machine learning inference in a trusted execution environment | |
Armknecht et al. | An efficient implementation of trusted channels based on OpenSSL | |
JP2010514000A (en) | Method for securely storing program state data in an electronic device | |
CN116781359A (en) | Portal security design method using network isolation and cryptograph | |
Englund et al. | Secure acceleration on cloud-based FPGAs–FPGA enclaves | |
Hamidy et al. | TC4SE: a high-performance trusted channel mechanism for secure enclave-based trusted execution environments | |
Fotiadis et al. | Root-of-Trust abstractions for symbolic analysis: Application to attestation protocols | |
IPsec | Microsoft Windows Common Criteria Evaluation | |
Huang et al. | An effective approach for remote attestation in trusted computing | |
Gallery et al. | A property-dependent agent transfer protocol | |
Pontes et al. | Multi-Platform and Vault-Free Attestation of Confidential VMs | |
Shang et al. | CCxTrust: Confidential Computing Platform Based on TEE and TPM Collaborative Trust | |
Walsh | TLS with trustworthy certificate authorities | |
Heeb et al. | Crypto Agility: Transition to post-quantum safe algorithms for secure key exchange and certificate generation | |
Voit et al. | RFC 9683: Remote Integrity Verification of Network Devices Containing Trusted Platform Modules | |
Lindskog et al. | Secure acceleration on cloud-based FPGAs--FPGA enclaves | |
Saravanan et al. | Automated policy based remote attestation in trusted computing | |
Catuogno et al. | Guaranteeing dependency enforcement in software updates | |
Raval et al. | Hardware Root of Trust on IoT Gateway | |
Linux et al. | FIPS 140-2 Non-Proprietary Security Policy |