secure computing Summary