trustworthy computing
#1

I am student of the engineering college of pune university.
We r doing project on trustworthy computing.
And we r going to implement a Access Control list.
Basically S.R.S is required to build
But we don't have much idea about how to start.
And I want some details of the modules that we r working on.
Our modules are:

Modules:

1. Enable Trusted Systems for Important Societal Applications
2. Develop Accurate Risk Analysis for Cyber security
3. Secure the Ubiquitous Computing Environments of the Future.
Reply
#2


More Info About trustworthy computing

Trustworthy Computing (TwC) has been applied to computing systems that are inherently secure, available and reliable. The Committee on Information Systems Trustworthiness’ publication, Trust in Cyberspace, defines such a system as one which“ does what people expect it to do – and not something else – despite environmental disruption, human user and operator errors, and attacks by hostile parties. Design and implementation errors must be avoided, eliminated or somehow tolerated. It is not sufficient to address only some of these dimensions, nor is it sufficient simply to assemble components that are themselves trustworthy. Trustworthiness is holistic and multidimensional. ”


More recently, Microsoft has adopted the term Trustworthy Computing as the title of a company initiative to improve public trust in its own commercial offerings. In large part, it is intended to address the concerns about the security and reliability of previous Microsoft Windows releases and, in part, to address general concerns about privacy and business practices. This initiative has changed the focus of many of Microsoft’s internal development efforts, but has been greeted with skepticism by some in the computer industry.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: trustworthy online casino, trustworthy online jobs, trustworthy computing under resource constraints with the down policy, trustworthy news, trustworthy computing under resource constraints with the down policy ppt, their trustworthy computing initiative, trustworthy computing as a seminar topic,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  pdf seminars report fog computing 1 7,751 09-10-2016, 06:52 PM
Last Post: hiiire
  Next Generation Secure Computing Base (NGSCB). [email protected] 7 5,269 04-10-2016, 10:50 AM
Last Post: Guest
  virtualization security in cloud computing seminars report pdf download 2 1,754 16-07-2016, 12:44 PM
Last Post: jaseela123d
  cloud computing lab manual doc 1 724 05-07-2016, 10:32 AM
Last Post: visalakshik
  mobile computing notes for 8th sem cse pdf 1 762 03-06-2016, 04:15 PM
Last Post: dhanabhagya
  distributed computing question papers vtu 1 666 31-05-2016, 11:43 AM
Last Post: dhanabhagya
  wireless networks and mobile computing 8th sem vtu notes 1 881 28-05-2016, 11:42 AM
Last Post: dhanabhagya
Thumbs Up basic interview questions in grid computing and answers 1 667 27-05-2016, 02:08 PM
Last Post: dhanabhagya
  complete java source code for ensuring data storage security in cloud computing 1 530 27-05-2016, 11:39 AM
Last Post: dhanabhagya
Wink ppt on convergence and computing 1 549 26-05-2016, 12:29 PM
Last Post: dhanabhagya

Forum Jump: