loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Dipankar Dasgupta ; Sudip Saha and Aregahegn Negatu

Affiliation: The University of Memphis, United States

ISBN: 978-989-8425-18-8

Keyword(s): Trusted Execution Technology, Trusted Platform Module, Digital Signature, Code Signing, Watermarking, Integrity Checker, Magic Cookie.

Related Ontology Subjects/Areas/Topics: Identification, Authentication and Non-Repudiation ; Information and Systems Security ; Information Assurance ; Models ; Paradigm Trends ; Risk Assessment ; Security Verification and Validation ; Software Engineering

Abstract: Various security mechanisms are available to validate, authenticate and permit codes, data and scripts for executing in a computing device. Accordingly, different techniques and tools have been developed to preserve integrity and confidentiality at the process, protocol, system and communication levels. For example, Trusted Platform Module, Intel Trusted Execution Technology and Windows Vista Kernel Mode security ensure system level integrity and security, whereas, Digital Signature, Code Signing, Watermarking, Integrity Checker and Magic Cookies address integrity of data and executables in transit. A brief survey of these techniques is described here with how these techniques help to secure computing environment.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.231.226.211

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Dasgupta D.; Saha S.; Negatu A. and (2010). TECHNIQUES FOR VALIDATION AND CONTROLLED EXECUTION OF PROCESSES, CODES AND DATA - A Survey.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 77-85. DOI: 10.5220/0002889800770085

@conference{secrypt10,
author={Dipankar Dasgupta and Sudip Saha and Aregahegn Negatu},
title={TECHNIQUES FOR VALIDATION AND CONTROLLED EXECUTION OF PROCESSES, CODES AND DATA - A Survey},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={77-85},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002889800770085},
isbn={978-989-8425-18-8},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - TECHNIQUES FOR VALIDATION AND CONTROLLED EXECUTION OF PROCESSES, CODES AND DATA - A Survey
SN - 978-989-8425-18-8
AU - Dasgupta, D.
AU - Saha, S.
AU - Negatu, A.
PY - 2010
SP - 77
EP - 85
DO - 10.5220/0002889800770085

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.