loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Dipankar Dasgupta ; Sudip Saha and Aregahegn Negatu

Affiliation: The University of Memphis, United States

Keyword(s): Trusted Execution Technology, Trusted Platform Module, Digital Signature, Code Signing, Watermarking, Integrity Checker, Magic Cookie.

Related Ontology Subjects/Areas/Topics: Identification, Authentication and Non-Repudiation ; Information and Systems Security ; Information Assurance ; Models ; Paradigm Trends ; Risk Assessment ; Security Verification and Validation ; Software Engineering

Abstract: Various security mechanisms are available to validate, authenticate and permit codes, data and scripts for executing in a computing device. Accordingly, different techniques and tools have been developed to preserve integrity and confidentiality at the process, protocol, system and communication levels. For example, Trusted Platform Module, Intel Trusted Execution Technology and Windows Vista Kernel Mode security ensure system level integrity and security, whereas, Digital Signature, Code Signing, Watermarking, Integrity Checker and Magic Cookies address integrity of data and executables in transit. A brief survey of these techniques is described here with how these techniques help to secure computing environment.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.217.208.72

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Dasgupta, D.; Saha, S. and Negatu, A. (2010). TECHNIQUES FOR VALIDATION AND CONTROLLED EXECUTION OF PROCESSES, CODES AND DATA - A Survey. In Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT; ISBN 978-989-8425-18-8; ISSN 2184-3236, SciTePress, pages 77-85. DOI: 10.5220/0002889800770085

@conference{secrypt10,
author={Dipankar Dasgupta. and Sudip Saha. and Aregahegn Negatu.},
title={TECHNIQUES FOR VALIDATION AND CONTROLLED EXECUTION OF PROCESSES, CODES AND DATA - A Survey},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT},
year={2010},
pages={77-85},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002889800770085},
isbn={978-989-8425-18-8},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT
TI - TECHNIQUES FOR VALIDATION AND CONTROLLED EXECUTION OF PROCESSES, CODES AND DATA - A Survey
SN - 978-989-8425-18-8
IS - 2184-3236
AU - Dasgupta, D.
AU - Saha, S.
AU - Negatu, A.
PY - 2010
SP - 77
EP - 85
DO - 10.5220/0002889800770085
PB - SciTePress