Signatures are generated for modules in a computer system. The signatures
can be assembled into an integrity log. The signatures are compared with
signatures in a database in an integrity validator. Once signatures are
either validated or invalidated, a trust score can be generated. The
trust score can then be used to determine whether the computer system
should be granted access to a resource using a policy.