Secure environment
In computing, a secure environment is any system which implements the controlled storage and use of information. In the event of computing data loss, a secure environment is used to protect personal or confidential data. It may also be known as a trusted execution environment (TEE). Often, secure environments employ cryptography as a means to protect information. This is typically used for processing confidential or restricted information. Some secure environments employ cryptographic hashing, simply to verify that the information has not been altered since it was last modified.
In computing, a secure environment is any system which implements the controlled storage and use of information. In the event of computing data loss, a secure environment is used to protect personal or confidential data. It may also be known as a trusted execution environment (TEE).[1][2]
Often, secure environments employ cryptography as a means to protect information. This is typically used for processing confidential or restricted information.[3]
Some secure environments employ cryptographic hashing, simply to verify that the information has not been altered since it was last modified.
See also
[edit]- Backup
- Data recovery
- Cleanroom
- Mandatory access control (MAC)
- Trusted computing
- Homomorphic encryption
References
[edit]- ^ Kumar, Sandeep; Moolchandani, Diksha; Sarangi, Smruti R. (2022). "Hardware-assisted mechanisms to enforce control flow integrity: A comprehensive survey". Journal of Systems Architecture. 130 102644. Elsevier BV. doi:10.1016/j.sysarc.2022.102644. ISSN 1383-7621.
- ^ "Basics of Trusted Execution Environments (TEEs): The Heart of Confidential Computing – Confidential Computing Consortium". Confidential Computing Consortium. 2024-03-13. Retrieved 2025-08-11.
- ^ Lee, Changhoon; Seigneur, Jean-Marc; Park, James J. Jong Hyuk; Wagner, Roland R. (2011-07-05). Secure and Trust Computing, Data Management, and Applications: STA 2011 Workshops: IWCS 2011 and STAVE 2011, Loutraki, Greece, June 28-30, 2011. Proceedings. Springer Science & Business Media. p. 174. ISBN 978-3-642-22364-8. Retrieved 2025-08-11.