DocumentCode :
541914
Title :
Techniques for validation and controlled execution of processes, codes and data: A survey
Author :
Dasgupta, Dipankar ; Saha, Sudip ; Negatu, Aregahegn
Author_Institution :
Department of Computer Science, The University of Memphis, Memphis, TN 38152, U.S.A.
fYear :
2010
fDate :
26-28 July 2010
Firstpage :
1
Lastpage :
9
Abstract :
Various security mechanisms are available to validate, authenticate and permit codes, data and scripts for executing in a computing device. Accordingly, different techniques and tools have been developed to preserve integrity and confidentiality at the process, protocol, system and communication levels. For example, Trusted Platform Module, Intel Trusted Execution Technology and Windows Vista Kernel Mode security ensure system level integrity and security, whereas, Digital Signature, Code Signing, Watermarking, Integrity Checker and Magic Cookies address integrity of data and executables in transit. A brief survey of these techniques is described here with how these techniques help to secure computing environment.
Keywords :
Digital signatures; Driver circuits; Encryption; Hardware; Java; Kernel; Code Signing; Digital Signature; Integrity Checker; Magic Cookie; Trusted Execution Technology; Trusted Platform Module; Watermarking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on
Conference_Location :
Athens
Type :
conf
Filename :
5741635
Link To Document :
بازگشت