,

SECURE COMPUTING

SECURE COMPUTING

The Secure Computing Domain aims to give precise definitions characterizing the various concepts that come into play when addressing the dependability and security of computing and communication systems. Clarifying these concepts is surprisingly difficult when we discuss systems in which there are uncertainties about system boundaries. Further-more, the very complexity of systems (and their specification) is often a major problem, the determination of possible causes or consequences of failure can be a very subtle process, and there are (fallible) provisions for preventing faults from causing failures. Secure computing is a term used for making secure networks where information can be transferred in a secure manner. Increasingly, individuals and organizations are developing or procuring sophisticated computing systems on whose services they need to place great trust—whether to service a set of cash dispensers, control a satellite constellation, an airplane, a nuclear plant, or a radiation therapy device, or to maintain the confidentiality of a sensitive data base. In differing circumstances, the focus will be on differing properties of such services—e.g., on the average real-time response achieved, the likelihood of producing the required results, the ability to avoid failures that could be cata- strophic to the system’s environment, or the degree to which deliberate intrusions can be prevented.

SECURE COMPUTING PROJECTS LIST

1. Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data
2. Cloud Data Auditing Techniques with a Focus on Privacy and Security
3. Malware Propagations in Wireless Ad Hoc Networks
4. Multitenant Access Control for Cloud-Aware Distributed File Systems
5. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
6. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
7. Towards a Reliable Detection of Covert Timing Channels over Real-Time Network Traffic
8. Privacy-Preserving Fine-Grained Data Retrieval Schemes For Mobile Social Networks
9. Fault-Tolerant Adaptive Routing in Dragonfly Networks
10. Optimal Spot-Checking for Collusion Tolerance in Computer Grids
11. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
12. A Multilevel Access Control Scheme for Data Security in Transparent Computing
13. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
14. Cooperative Query Answer Authentication Scheme over Anonymous Sensing Data
15. Public Interest Analysis Based on Implicit Feedback of IPTV Users
16. SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks

glossy-login-form Website Template | Home :: w3layouts



1000

PROJECT DOMAINS

20000

STUDENTS SERVED

1000

PROJECT DOMAINS

5

YEARS EXPERIENCE

IEEE PROJECTDOMAINS



@2018 beprojectcenter. All Rights Reserved.Designed DLK Technologies Pvt Ltd.