X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (1223) 1223
Conference Proceeding (404) 404
Book Chapter (128) 128
Trade Publication Article (91) 91
Newspaper Article (88) 88
Paper (67) 67
Book / eBook (64) 64
Magazine Article (55) 55
Publication (34) 34
Dissertation (32) 32
Government Document (11) 11
Book Review (2) 2
Report (2) 2
Journal / eJournal (1) 1
Newsletter (1) 1
Web Resource (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
attestations (710) 710
auditor attestation (308) 308
remote attestation (285) 285
trusted computing (279) 279
attestation (278) 278
security (173) 173
verbs (158) 158
auditing standards (145) 145
words (127) 127
etymology (110) 110
papyrus (89) 89
authentication (84) 84
hardware (82) 82
direct anonymous attestation (80) 80
protocols (80) 80
cloud computing (79) 79
privacy (79) 79
nouns (78) 78
financial statements (76) 76
good practice (73) 73
private sector (72) 72
procurement (71) 71
verification (71) 71
sales (70) 70
electricity (69) 69
software (69) 69
transparency (69) 69
trusted platform module (69) 69
accounting (68) 68
financial resources (68) 68
business environment (67) 67
certificate (67) 67
inspection (67) 67
lexicology (67) 67
transaction (67) 67
business entry (66) 66
business indicator (66) 66
business registration (66) 66
businesses (66) 66
commercial business (66) 66
competitiveness (66) 66
installation (66) 66
material (66) 66
new markets (66) 66
one-stop shop (66) 66
purchasing (66) 66
queries (66) 66
regulatory environment (66) 66
telephone (66) 66
certification (65) 65
distribution network (65) 65
domain (65) 65
e-mail (65) 65
scribes (65) 65
securities (65) 65
service providers (65) 65
buyer (64) 64
commercial activities (64) 64
contractors (64) 64
users (64) 64
creditors (63) 63
licenses (63) 63
overhead (63) 63
vowels (63) 63
access to services (61) 61
bank loan (61) 61
business regulation (61) 61
regulatory requirements (61) 61
collateral (60) 60
deposit (60) 60
information sharing (60) 60
limited liability (60) 60
property rights (60) 60
trading (60) 60
turnover (60) 60
bankruptcy (59) 59
borrower (59) 59
credit information (59) 59
immovable property (59) 59
international bank (59) 59
lender (59) 59
personal assets (59) 59
warehouse (59) 59
compliance costs (58) 58
computer science (58) 58
credit history (58) 58
credit information system (58) 58
financial institutions (58) 58
legal rights (58) 58
license (58) 58
liens (58) 58
local business (58) 58
movable collateral (58) 58
shareholder (58) 58
cadastre (57) 57
capital gains (57) 57
collateral for loans (57) 57
credit source (57) 57
financial history (57) 57
investor protection (57) 57
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
OISE - Stacks (7) 7
Robarts - Government Pubs (7) 7
Robarts - Stacks (4) 4
Gerstein Science - Stacks (3) 3
UTL at Downsview - May be requested (3) 3
OISE - Reference (2) 2
Online Resources - Online (2) 2
Collection Dvlpm't (Acquisitions) - Closed Orders (1) 1
Collection Dvlpm't (Acquisitions) - Vendor file (1) 1
Faculty of Information - Stacks (1) 1
Indust. Rel's & Hum. Resources (Newman) - Library use only (1) 1
UofT at Mississauga - Stacks (1) 1
UofT at Scarborough - Withdrawn (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (1997) 1997
French (38) 38
Chinese (32) 32
Korean (16) 16
Japanese (15) 15
Russian (9) 9
Bulgarian (2) 2
Lithuanian (2) 2
Polish (2) 2
Spanish (2) 2
Czech (1) 1
German (1) 1
Indonesian (1) 1
Persian (1) 1
Portuguese (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Requirements for certification of teachers, counselors, librarians, administrators for elementary and secondary schools, ISSN 1047-7071, 1989
Journal
The Bulletin of the American Society of Papyrologists, ISSN 0003-1186, 1/2013, Volume 50, pp. 203 - 206
The annotations in BKT 10.4 (Odyssey 15) are reconsidered. Several of them report variant readings ascribed to the text known as ἡ κοινή. 
Attestations | Papyrus
Journal Article
Journal of Accounting Education, ISSN 0748-5751, 12/2014, Volume 32, Issue 4, pp. 49 - 57
•This case provides an introduction to attestation services and standards.•Students are required to identify and describe the different types of attestation... 
Attestation risk | Attestation standards | Business risk | Attestation | Accounting firms | Accountants
Journal Article
Revue d'assyriologie et d'archéologie orientale, ISSN 0373-6032, 2012, Volume 106, Issue 1, pp. 33 - 36
Une nouvelle attestation du terme KÍD.SAG, “portier”, dans un texte administratif du Palais G d’Ébla (TM.75.G.2590 = ARET I 6) trouvé à Tell Mardikh (Syrie)... 
Attestations | Palaces
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 12/2016, Volume 49, Issue 3, pp. 1 - 31
Attestation is a mechanism used by a trusted entity to validate the software integrity of an untrusted platform. Over the past few years, several attestation... 
Attestation | wireless sensor networks | Wireless sensor networks | NODE COMPROMISE DETECTION | SOFTWARE-BASED ATTESTATION | SYSTEMS | COMPUTER SCIENCE, THEORY & METHODS | Security | Surveys | Sensors
Journal Article
Operating Systems Review (ACM), ISSN 0163-5980, 2003, Volume 37, Issue 5, pp. 193 - 206
Conference Proceeding
IEEE Internet of Things Journal, ISSN 2327-4662, 10/2017, Volume 4, Issue 5, pp. 1125 - 1142
Journal Article
Proceedings of the 2016 ACM SIGSAC Conference on computer and communications security, ISSN 1543-7221, 10/2016, Volume 24-28-, pp. 731 - 742
Large numbers of smart connected devices, also named as the Internet of Things (IoT), are permeating our environments (homes, factories, cars, and also our... 
collective attestation | denial of service (dos) | network protocol | remote attestation | malware infestation
Conference Proceeding
Ruan Jian Xue Bao/Journal of Software, ISSN 1000-9825, 2014, Volume 25, Issue 6, pp. 1273 - 1290
Remote attestation, whether binary-based or property-based, mostly undertakes the static environment of the trusted terminal where only part of software... 
Attestation agent | Remote attestation | Trusted computing | Property attestation | Behaviors on terminal | Verification agent | Trustworthiness | Dynamic mechanical properties | Dynamics | Running | Strategy | Software | Terminals | Computer programs
Journal Article
Computer Networks, ISSN 1389-1286, 04/2018, Volume 134, pp. 167 - 182
With the rise of Internet of Things (IoT) and Cyber-Physical Systems (CPS), the need for smart embedded devices is rapidly increasing, and so does the security... 
Remote attestation | IoT security | Physically unclonable function (PUF) | CPS security | Authentication | Embedded security | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | SOFTWARE-BASED ATTESTATION | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC | Memory (Computers)
Journal Article
Future Generation Computer Systems, ISSN 0167-739X, 2011, Volume 27, Issue 5, pp. 564 - 573
Binary attestation in trusted computing platforms provide the ability to reason about the state of a system using hash measurements. Property based... 
Trusted computing | Property attestation | Dynamic trust modelling | Attestation | COMPUTER SCIENCE, THEORY & METHODS | TRANSACTIONS
Journal Article
2012 IEEE Symposium on Security and Privacy, ISSN 1081-6011, 05/2012, pp. 239 - 253
In this paper we present a comprehensive timing-based attestation system suitable for typical enterprise use, and evidence of that system's performance. This... 
software-based attestation | Protocols | Coordinate measuring machines | trusted platform module | Radiation detectors | remote attestation | Hardware | timing-based attestation | TOCTOU attack | Registers | Servers | Kernel
Conference Proceeding
International Journal of Applied Engineering Research, ISSN 0973-4562, 2014, Volume 9, Issue 22, pp. 12087 - 12096
Journal Article
Zeitschrift für Papyrologie und Epigraphik, ISSN 0084-5388, 1/2013, Volume 186, pp. 267 - 269
Journal Article
Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, ISSN 1543-7221, 11/2013, pp. 1 - 12
Software attestation has become a popular and challenging research topic at many established security conferences with an expected strong impact in practice.... 
security framework | software attestation | keyless crypto
Conference Proceeding
The Journal of Finance, ISSN 0022-1082, 6/2010, Volume 65, Issue 3, pp. 1163 - 1196
Journal Article
Zeitschrift für Papyrologie und Epigraphik, ISSN 0084-5388, 1/2009, Volume 171, pp. 5 - 8
Journal Article
Ruan Jian Xue Bao/Journal of Software, ISSN 1000-9825, 09/2018, Volume 29, Issue 9, pp. 2874 - 2895
Journal Article
Zeitschrift für Papyrologie und Epigraphik, ISSN 0084-5388, 1/2012, Volume 183, pp. 179 - 184
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.