Next Generation Secure Computing Base (NGSCB).
#1

Hello,
Please mail me all the related data related with the topic "Next Generation Secure Computing Base (NGSCB)". I will be very much thank if it comprises of PPT and Seminar Report.

Kindly,send it before 24th of january,2010.
Thanking you,
Yours Sincerly,
Vishwavikram
Reply
#2
Next Generation Secure Computing Base (NGSCB)
A broad definition can be given as:
The Next Generation Secure Computing Base (NGSCB) is a part of the Microsoft Vista operating system (OS) that employs a trusted platform module (TPM), a specialized chip that can be installed on the motherboard of a personal computer (PC) or server for the purpose of hardware authentication. NGSCB technology came under the code name Palladium, which was the word for a mythical talisman that guaranteed the security of Troy. NGSCB relies on hardware technology designed by members of the Trusted Computing Group (TCG), which provides a number of security-related features, including fast random number generation, a secure cryptographic co-processor, and the ability to hold cryptographic keys in a manner that should make them impossible to retrieve, even to the machine's owner.The development-phase version of NGSCB was originally called Palladium which was conceived jointly by Intel, AMD and Microsoft.

Architecture and technical details
It consists ofsoftware components developed by Microsoft and hardware components developed by the Trusted Computing Group.It requires specialized hardware and is not compatible with pc's before 2004.The two hardware components are: the Trusted Platform Module (TPM), which will provide secure storage of cryptographic keys and a secure cryptographic co-processor, and a curtained memory feature in the Central Processing Unit (CPU).

Secure storage and attestation

At the time of manufacture, a cryptographic key is generated and stored within the TPMand the TPM is designed in such a way that it is extremely difficult to retrieve the stored key by reverse engineering or any other method, even to the owner. Applications can pass data encrypted with this key to be decrypted by the TPM, but the TPM will only do so under certain strict conditions.The TPM is also able to produce a cryptographic signature based on its hidden key.

Curtained memory
Data within curtained memory can only be accessed by the application to which it belongs, and not by any other application or the Operating System.It is difficult to trick a trusted application into running outside of curtained memory and hence reverse engineering is also difficult.

Uses:
Digital Rights Management:
a secure form of Digital Rights Management (DRM) may be developed By utilizing the attestation, curtained memory and cryptographic features of the TPM. DRM would be implemented by encrypting DRM-protected files and only making the decryption key available to corporate trusted applications. Encrypted files are such that it would be extremely difficult to decrypt the file at an unauthorized destination, rendering it useless.

Owner Override:
Here, a secure method for the owner to identify themselves would be provided, and through this method the owner would be able to force the TPM to make a false attestation or decrypt data for an application that would not otherwise be allowed access to that data.

Network access:
NGSCB provides each workstation the ability to securely attest that no unauthorized modifications have been made either to its hardware or software.

ppt download:
[attachment=1389]

for a seminar report pdf, visit:
http://sewpsc.sewp.nasa.gov/documents/ngscb.pdf
Reply
#3
thanx very very very much.....for your ppt and report.....really thank you
Reply
#4
thanks dude...................
Reply
#5
Shocked 
could you send document of NGSCB
Reply
#6
to get information about the topic NEXT GENERATION COMPUTING BASE full report ,ppt and related topic refer the page link bellow

http://studentbank.in/report-next-genera...base-ngscb

http://studentbank.in/report-next-genera...gscb--6101

http://studentbank.in/report-next-genera...scb?page=2
Reply
#7
to get information about the topic NEXT GENERATION COMPUTING BASE full report ,ppt and related topic refer the page link bellow

http://studentbank.in/report-next-genera...base-ngscb

http://studentbank.in/report-next-genera...gscb--6101

http://studentbank.in/report-next-genera...scb?page=2
Reply
#8
Hello,
Please mail me all the related data related with the topic "Next Generation Secure Computing Base (NGSCB)". I will be very much thank if it comprises of PPT and Seminar Report.

Kindly,send it before 10th of october,2016.
Thanking you,
Yours Sincerly,
jameskarangwa[at]gmail.com
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: tpm questainaire, the next generation of computing, next generation secure base computing doc**word format, ieee paper on next generation secure computing base, next generation security base, abstract base, next generatition secure computing base seminar,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  secure chat using RSA algorithm karthik1218 2 2,581 14-10-2016, 02:48 PM
Last Post: info togel
  pdf seminars report fog computing 1 7,729 09-10-2016, 06:52 PM
Last Post: hiiire
Wink uml diagram for privacy preserving public auditing for secure cloud storage 2 1,007 19-09-2016, 10:20 PM
Last Post: harikash
  download next generation 2 stroke engine ppt 2 934 21-07-2016, 04:23 PM
Last Post: jaseela123d
  virtualization security in cloud computing seminars report pdf download 2 1,752 16-07-2016, 12:44 PM
Last Post: jaseela123d
  cloud computing lab manual doc 1 723 05-07-2016, 10:32 AM
Last Post: visalakshik
Heart next day prediction number for mizoram lottery result 1 759 04-07-2016, 11:07 AM
Last Post: visalakshik
  literature review on electricity generation 1 573 08-06-2016, 04:40 PM
Last Post: dhanabhagya
  mobile computing notes for 8th sem cse pdf 1 760 03-06-2016, 04:15 PM
Last Post: dhanabhagya
  distributed computing question papers vtu 1 664 31-05-2016, 11:43 AM
Last Post: dhanabhagya

Forum Jump: