Next Generation Secure Computing Base (NGSCB)
#5
[attachment=13470]
NEW GENERATION SECURE COMPUTING BASE
INTRODUCTION

Next Generation Secure Computing Base,formerly known as Palladium.
The aim for palladium is to increase the security and privacy of computer user.
Palladium refers to as a security chip
INTRODUCTION
Internet security is also provided by palladium such as protecting data from virus and hacking of data.
Palladium gives individual & groups of users greater data security ,personal privacy & system integrity.
Solution Tonguealladium
The fundamental benefit of Palladium fall into three chief categories;
Greater system integrity, superior personal privacy & enhanced data security
System integrity: Verification of hardware/software component, to what they are and what sealed data they can access.
Enhanced data security:
Authenticate machine identify
keys are stored sealed storage
Protect personal privacy:
Prevent unauthorized access of personal data from the network
CORE PRINCIPLES OF PALLADIUM
Palladium comprises two key component :
Hardware
Software
HARDWARE COMPONENTS
TRUSTED SPACE
SEALED STORAGE
ATTESTATION
TRUSTED SPACE
The execution space is protected from external software attacks such as a virus.
Trusted space is set up and maintained by nexus .
SEALED STORAGE
Sealed storage is an authenticated mechanism allows a program to store secrets that cannot be retrieved by no trusted program such as a virus or Trojan horse.
ATTESTATION
Attestation is a mechanism that allows the user to reveal selected characteristics of the operating environment to external requestor
SOFTWARE COMPONENTS
NEXUS
TRUSTED AGENT
NEXUS

Technology formerly referred to as the Trusted Operating Root(TOR).
The nexus executes in kernel mode in the trusted space.
It provides basic services to trusted agents
TRUSTED AGENT
Trusted agent is a program a part of a program ,or a service that runs in user mode in the trusted space
A Trusted agent calls the nexus for security related services and critical general services such as memory management
Know Element of Palladium
The system will store personal data with in an encrypted folder.
The system will filter
The system has personal information sharing agent called”My Man”.
The system will depend on hardware that has either a digital signature or tracking number.
The system purports to stop viruses by preventing the running of malicious programs
COMPARISON OF TCPA and PALLADIUM
TCPA Stands for Trusted Computing Platform Alliance, an initiative led by Intel.
Palladium is a software that Microsoft says it plane to incorporate in future version of Window.
ADVANTAGES OF PALLADIUM
BLOCK MALICIOUS CODE
DIGITAL RIGHT MANAGEMENT
DISADVANTAGES OF PALLADIUM
UPGRADES
INTEROPERABILITY
LEGACY PROGRAMS
CONCLUSION
This technology will provide tougher security defenses and more abudnat privacy.
Palladium users will have unparallel power over system integrity ,Personal privacy and data security.
A new generation of Palladium compatible hardware and peripherals will need to design and built.
Palladium is not a magic bullet.
It provided the trustworthiness necessary to enable business ,government and individual to fully embrace the increasing digitization of life.
FUTURE ENHANCEMENT
Palladium could easily becomes a requirement for future Window Microsoft has been some cool enhancement in 2010 version
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: next generation secure computing base doc, technical seminor topic next generation secure computing base documentation, macadam base, ngscb report, next generatition secure computing base seminar, base sas online training, abstract base,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Next Generation Secure Computing Base (NGSCB) - by seminar class - 09-05-2011, 02:58 PM
RE: Next Generation Secure Computing Base (NGSCB) - by Guest - 27-10-2012, 08:21 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  A SEMINAR REPORT on GRID COMPUTING Computer Science Clay 5 16,422 09-03-2015, 04:48 PM
Last Post: iyjwtfxgj
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 83,708 03-04-2014, 11:39 PM
Last Post: seminar report asees
  Soft Computing seminar surveyer 2 11,291 29-10-2013, 03:50 PM
Last Post: kavitaswami93gmail.com
  Modular Computing seminars report computer science crazy 4 22,229 08-10-2013, 04:32 PM
Last Post: Guest
  self managing computing system full report computer science technology 5 14,267 18-05-2013, 09:48 AM
Last Post: computer topic
  Unicode And Multilingual Computing computer science crazy 2 8,322 06-05-2013, 11:18 AM
Last Post: computer topic
  What Networking of Information Can Do for Cloud Computing project topics 1 8,293 29-03-2013, 01:03 AM
Last Post: Guest
Brick Face Recognition using the Techniques Base on Principal Component Analysis (PCA) computer science crazy 3 2,968 04-03-2013, 01:21 PM
Last Post: Guest
  pervasive computing full report computer science technology 11 18,546 02-03-2013, 11:34 AM
Last Post: seminar details
  Nanocell Logic Gates For Molecular Computing full report seminar presentation 3 10,140 02-01-2013, 10:21 AM
Last Post: seminar details

Forum Jump: