Trustworthy Computing under Resource Constraints with the DOWN Policy

In this project we substantially improve the ability of low-cost ScPs to protect their secrets. We use DOWN policy which relies on the ability to operate with fractional parts of secrets. Taking full advantage of the DOWN policy requires consideration of the nature of computations performed with secrets and even the mechanisms employed for distribution of secrets.

A web like organization of information works the best for most people. With this structure, web pages are linked to each other when relate contextual. There could be several links to a single page, or every document usually has at least two ways to get it. Links could lead the users in a circular path. From  the navigation point of view, this kind of site  is very appealing. It allows the users to get around this site quickly and enjoy a more free form experience of the site. Hence most of the designers use the spider web like approach to organize their content and the web sites.

Web sites require a specialized database they must perform well in a distributed architecture, support object oriented applications and store extended data types like images, spatial and multimedia. Web sites use an object-oriented data base management system (ODBMS) because they are optimized for distributed, object-oriented that store new data types.

 The flow of messages and data in this web server architecture takes place in the following manner. The web browser sends a request for an html template to the web server via the http protocol. The web server receives the request and passes it to one of a pool of ODBMS web service processes on the same machine or LAN as the web server. The web server and the web service communicate via a protocol, which could be either a CGI, FCGI , ISAPI or NSAPI. The web service combines the html in the template file with variables return from the methods to form html dynamically. The browsers thus receive the relation systems by a synchronization gateway. Tools like agents that track the user profile preference, and the database online utilities also interact  with  the database.

SOFTWARE REQUIREMENTS

VS .NET 2005, C#

SQL SERVER 2000

Windows XP.

HARDWARE REQUIREMENTS

Hard disk                     :           40 GB

RAM                           :           512mb

Processor                     :           Pentium IV

Monitor                           :        17’’Color Monitor