Authors:
            
                    Dipankar Dasgupta
                    
                        
                    
                    ; 
                
                    Sudip Saha
                    
                        
                    
                     and
                
                    Aregahegn Negatu
                    
                        
                    
                    
                
        
        
            Affiliation:
            
                    
                        
                    
                    The University of Memphis, United States
                
        
        
        
        
        
             Keyword(s):
            Trusted Execution Technology, Trusted Platform Module, Digital Signature, Code Signing, Watermarking, Integrity Checker, Magic Cookie.
        
        
            
                Related
                    Ontology
                    Subjects/Areas/Topics:
                
                        Identification, Authentication and Non-Repudiation
                    ; 
                        Information and Systems Security
                    ; 
                        Information Assurance
                    ; 
                        Models
                    ; 
                        Paradigm Trends
                    ; 
                        Risk Assessment
                    ; 
                        Security Verification and Validation
                    ; 
                        Software Engineering
                    
            
        
        
            
                Abstract: 
                Various security mechanisms are available to validate, authenticate and permit codes, data and scripts for executing in a computing device.  Accordingly, different techniques and tools have been developed to preserve integrity and confidentiality at the process, protocol, system and communication levels.  For example, Trusted Platform Module, Intel Trusted Execution Technology and Windows Vista Kernel Mode security ensure system level integrity and security, whereas, Digital Signature, Code Signing, Watermarking, Integrity Checker and Magic Cookies address integrity of data and executables in transit.  A brief survey of these techniques is described here with how these techniques help to secure computing environment.