trustworthy computing
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Active In SP

Posts: 1
Joined: Sep 2010
05-09-2010, 10:53 AM

I am student of the engineering college of pune university.
We r doing project and implimentation on trustworthy computing.
And we r going to implement a Access Control list.
Basically S.R.S is required to build
But we don't have much idea about how to start.
And I want some details of the modules that we r working on.
Our modules are:


1. Enable Trusted Systems for Important Societal Applications
2. Develop Accurate Risk Analysis for Cyber security
3. Secure the Ubiquitous Computing Environments of the Future.

Attached Files
.doc   PROJECT SYNOPSIS.doc (Size: 40 KB / Downloads: 48)
project report helper
Active In SP

Posts: 2,270
Joined: Sep 2010
22-09-2010, 05:55 PM

More Info About trustworthy computing

Trustworthy Computing (TwC) has been applied to computing systems that are inherently secure, available and reliable. The Committee on Information Systems Trustworthiness’ publication, Trust in Cyberspace, defines such a system as one which“ does what people expect it to do – and not something else – despite environmental disruption, human user and operator errors, and attacks by hostile parties. Design and implementation errors must be avoided, eliminated or somehow tolerated. It is not sufficient to address only some of these dimensions, nor is it sufficient simply to assemble components that are themselves trustworthy. Trustworthiness is holistic and multidimensional. ”

More recently, Microsoft has adopted the term Trustworthy Computing as the title of a company initiative to improve public trust in its own commercial offerings. In large part, it is intended to address the concerns about the security and reliability of previous Microsoft Windows releases and, in part, to address general concerns about privacy and business practices. This initiative has changed the focus of many of Microsoft’s internal development efforts, but has been greeted with skepticism by some in the computer industry.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  mobile computing architecture ppt by rajkamal Guest 1 74 31-10-2016, 09:13 AM
Last Post: ijasti
  seminar report pervasive computing pdf Guest 1 61 29-10-2016, 03:07 PM
Last Post: Dhanabhagya
  data leakage detection using cloud computing ppt Guest 1 59 11-10-2016, 09:10 AM
Last Post: amrutha735
  advantage and disadvantage of soft computing ppt Guest 1 104 08-10-2016, 03:38 PM
Last Post: amrutha735
  advantages and disadvantages of fog computing Guest 1 117 08-10-2016, 11:41 AM
Last Post: amrutha735
  cloud computing unit wise ppts Guest 1 79 02-07-2016, 11:43 AM
Last Post: jaseela123
  advantages and disadvantages of rover technology location aware computing Guest 1 117 01-07-2016, 11:32 AM
Last Post: Dhanabhagya
  hindi meaning of grid computing Guest 1 68 28-06-2016, 04:13 PM
Last Post: Dhanabhagya
  flowchart for cgpa calculator in cloud computing Guest 1 77 28-04-2016, 03:10 PM
Last Post: mkaasees
  parallel computing mcq with answers Guest 1 138 12-04-2016, 03:10 PM
Last Post: mkaasees