Secure environment
In computing, a secure environment is any system which implements the controlled storage and use of information. In the event of computing data loss, a secure environment is used to protect personal or confidential data. It may also be known as a trusted execution environment (TEE).[1][2]
Often, secure environments employ cryptography as a means to protect information. This is typically used for processing confidential or restricted information.[3]
Some secure environments employ cryptographic hashing, simply to verify that the information has not been altered since it was last modified.
See also
- Backup
- Data recovery
- Cleanroom
- Mandatory access control (MAC)
- Trusted computing
- Homomorphic encryption
References
- ^ Kumar, Sandeep; Moolchandani, Diksha; Sarangi, Smruti R. (2022). "Hardware-assisted mechanisms to enforce control flow integrity: A comprehensive survey". Journal of Systems Architecture. 130. Elsevier BV: 102644. doi:10.1016/j.sysarc.2022.102644. ISSN 1383-7621.
- ^ "Basics of Trusted Execution Environments (TEEs): The Heart of Confidential Computing – Confidential Computing Consortium". Confidential Computing Consortium. 2024-03-13. Retrieved 2025-08-11.
- ^ Lee, Changhoon; Seigneur, Jean-Marc; Park, James J. Jong Hyuk; Wagner, Roland R. (2011-07-05). Secure and Trust Computing, Data Management, and Applications: STA 2011 Workshops: IWCS 2011 and STAVE 2011, Loutraki, Greece, June 28-30, 2011. Proceedings. Springer Science & Business Media. p. 174. ISBN 978-3-642-22364-8. Retrieved 2025-08-11.