Seminar Report On PRIVACY & SECURITY IN HIGHLY DYNAMIC SYSTEMS
#1

Seminar Report
On
PRIVACY & SECURITY IN
HIGHLY DYNAMIC SYSTEMS



[attachment=33]

INTRODUCTION
Highly Dynamic System (HDS) is a collection of heterogeneous and decentralized nodes in a wireless network. The devices are differing in their size, shape, storage capacity, mobility, connectivity etc. We can add new devices into HDS according to our needs and also remove certain devices that are not working properly from the system. The applications in this system are service-oriented and distributed. Systems in healthcare, entertainment, traffic control and retail are some examples of HDS.The way in which HDS are used raises a number of issues, particularly with regard to privacy and security. So it is necessary, to provide certain measures in order to provide privacy and security. For this here we discuss two methods, Personalization and Usage Control. These methods are not based on access control, rather based on the usage of personal data.

HIGHLY DYNAMIC SYSTEMS
There had been no revolution in the early days of computer revolution. Computers are more or less the same. First, there is no discontinuity in the technology. Second, only the corporation of low-cost computers, advanced interfaces to the physical world, and increased and affordable bandwidth define how useful computers are for processing, storing, and communicating information.
The mainframe and PCs eras are characterized by different hardware and software, a different style of use and new applications. Highly dynamic systems (HDS) consisting of heterogeneous, decentralized nodes in wireless networks. The devices differ in size, storage capacity, connectivity , mobility, processing power and user interfaces. The applications in HDS are service oriented and distributed. We already interact today with HDS systems in health services, traffic control, entertainment, and retail. The success factor of Highly Dynamic Systems will be non-technically motivated and will be found in the properties to dynamically handle openness and adapt to changes. Dynamic handling of Openness: HDS are not specified for a given task and limited space. They experience a continuous extension. Dynamic adaptation to Changes: Interaction with HDS is not pre- specified and the usage is determined during utilization. The way HDS are used raises a number of trustworthiness issues, particularly with regard to privacy and security. Security is often equated with access control, which consist of authentication and authorization and is realized in such a way that unauthorized operations are identified in advance. Any access rights contradict with the openness and adaptation properties of HDS.
Privacy is the possibility to control the distribution and use of personal data. All the existing privacy technologies are based on security technologies, and are only effective in a predefined setting. The seminar Privacy and Security in HDS insights into some of the challenges involved in realized security and privacy in HDS. Here it proposes a privacy solution that is not based on access control, but unconditionally accepts any form of data collection and provides the possibility to verify the usage of this data.
For implementing privacy and security mechanisms, here we use two methods:
I.Personalization in HDS.
II.Distributed Usage Control.

PERSONALIZATION IN HDS
Objects of everyday use are becoming increasingly interconnected and mobile communication involving devices of all sizes and bandwidths are used in various ways. Highly dynamic information systems (HDS) are emerging, bringing new challenges for the management of information systems: having to cope with components that enter and leave the system spontaneously and be autonomous in their actions. The changing and possibly conflicting requirements of the single component must be taken into account, which demands must be able to contend with the constant growth of communicated data rapidly collected and accumulated in various forms.
Solving the challenges of HDS is accompanied by a prospect economic potential. A first realization is the present rollout of RFID by major retail groups worldwide. Currently, cost savings through process automation are of prime importance but the use of this technology in retailing goes beyond mere productivity improvements. Tagging items with RFID chips in combination with other wireless technologies, equipping customers with mobile communication devices, and using sensor network allow, for example, personalizing services that have so for been successfully used in client-server e-commerce scenarios.
Reply
#2
applications of reactive powder concrete
Reply
#3
[attachment=8798]
PRIVACY & SECURITY INHIGHLY DYNAMIC SYSTEMS
INTRODUCTION

Highly Dynamic System (HDS) is a collection of heterogeneous anddecentralized nodes in a wireless network. The devices are differing in theirsize, shape, storage capacity, mobility, connectivity etc. We can add newdevices into HDS according to our needs and also remove certain devicesthat are not working properly from the system.The applications in this system are service-oriented and distributed. Systemsin healthcare, entertainment, traffic control and retail are some examples ofHDS.The way in which HDS are used raises a number of issues, particularlywith regard to privacy and security. So it is necessary, to provide certainmeasures in order to provide privacy and security. For this here we discusstwo methods, Personalization and Usage Control. These methods are notbased on access control, rather based on the usage of personal data.
HIGHLY DYNAMIC SYSTEMS
There had been no revolution in the early days of computer revolution.Computers are more or less the same. First, there is no discontinuity in thetechnology. Second, only the corporation of low-cost computers, advancedinterfaces to the physical world, and increased and affordable bandwidthdefine how useful computers are for processing, storing, and communicatinginformation.The mainframe and PCs eras are characterized by different hardware andsoftware, a different style of use and new applications. Highly dynamicsystems (HDS) consisting of heterogeneous, decentralized nodes in wirelessnetworks. The devices differ in size, storage capacity, connectivity ,mobility, processing power and user interfaces. The applications in HDS areservice oriented and distributed.We already interact today with HDS systems in health services, trafficcontrol, entertainment, and retail. The success factor of Highly DynamicSystems will be non-technically motivated and will be found in theproperties to dynamically handle openness and adapt to changes
.•Dynamic handling of Openness: HDS are not specified for a giventask and limited space. They experience a continuous extension.
• Dynamic adaptation to Changes: Interaction with HDS is not prespecifiedand the usage is determined during utilization.The way HDS are used raises a number of trustworthiness issues,particularly with regard to privacy and security. Security is often equatedwith access control, which consist of authentication and authorization and isrealized in such a way that unauthorized operations are identified inadvance. Any access rights contradict with the openness and adaptationproperties of HDS.Privacy is the possibility to control the distribution and use of personal data.All the existing privacy technologies are based on security technologies, andare only effective in a predefined setting. The seminar Privacy and Securityin HDS insights into some of the challenges involved in realized securityand privacy in HDS.Here it proposes a privacy solution that is not based on access control, butunconditionally accepts any form of data collection and provides thepossibility to verify the usage of this data.For implementing privacy and security mechanisms, here we use twomethods
I.Personalization in HDS.
II.Distributed Usage Control.
PERSONALIZATION IN HDS
Objects of everyday use are becoming increasingly interconnected andmobile communication involving devices of all sizes and bandwidths areused in various ways. Highly dynamic information systems (HDS) areemerging, bringing new challenges for the management of informationsystems: having to cope with components that enter and leave the systemspontaneously and be autonomous in their actions.The changing and possibly conflicting requirements of the singlecomponent must be taken into account, which demands must be able tocontend with the constant growth of communicated data rapidly collectedand accumulated in various forms.Solving the challenges of HDS is accompanied by a prospect economicpotential. A first realization is the present rollout of RFID by major retailgroups worldwide. Currently, cost savings through process automation areof prime importance but the use of this technology in retailing goes beyondmere productivity improvements.Tagging items with RFID chips in combination with other wirelesstechnologies, equipping customers with mobile communication devices, andusing sensor network allow, for example, personalizing services that have sofor been successfully used in client-server e-commerce scenarios.Online retailers use the Internet today on a larger scale to recommend theirnew products and services to known customers according to their previouspurchases or interests. Based on these collected data we can classify theservices into three. They are:i. Personalized Services.ii. Individualized Services.iii. Universal Services.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: mobile security systems, dynamic systems austin tx, seminar report on security systems for atm, privacy security in highly dynamic systems ppt, seminar report on dynamic positioning, 3d security seminar report, dynamic language seminar ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 20,484 24-11-2018, 01:19 AM
Last Post:
  Optical Computer Full Seminar Report Download computer science crazy 46 66,653 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  Digital Signature Full Seminar Report Download computer science crazy 20 43,976 16-09-2015, 02:51 PM
Last Post: seminar report asees
  HOLOGRAPHIC VERSATILE DISC A SEMINAR REPORT Computer Science Clay 20 39,322 16-09-2015, 02:18 PM
Last Post: seminar report asees
  Computer Sci Seminar lists7 computer science crazy 4 11,484 17-07-2015, 10:29 AM
Last Post: dhanyasoubhagya
  Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks seminar surveyer 3 2,823 14-07-2015, 02:24 PM
Last Post: seminar report asees
  Steganography In Images (Download Seminar Report) Computer Science Clay 16 25,807 08-06-2015, 03:26 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,029 01-05-2015, 03:36 PM
Last Post: seminar report asees
  A SEMINAR REPORT on GRID COMPUTING Computer Science Clay 5 16,239 09-03-2015, 04:48 PM
Last Post: iyjwtfxgj
  SQL INJECTION A SEMINAR REPORT Computer Science Clay 10 12,108 18-10-2014, 09:50 PM
Last Post: jaseela123d

Forum Jump: