Abstract
Trusted platform modules (TPMs) specification is highly complex and therefore the deployment of TPM –based security solutions is equally complicated and difficult; although they can provide a wide range of security functionalities. In order to make TPM technology available to system engineers without their needing to have in-depth knowledge of trusted computing specifications we propose, in this paper, to develop an approach using security patterns to specify TPM-based security solutions. Ideally suited to producing precise specifications of TPM –based solutions for certain security goals are the refined notions of security patterns developed in the SERENITY research project.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Fernandez, E.: Security patterns. In: Procs. of the Eigth International Symposium on System and Information Security - SSI 2006, Keynote talk, Sao Jose dos Campos, Brazil (November 2006)
Fernandez, E., Rouyi, P.: A pattern language for security models. In: Pattern Languages of Program Design, PLoP 2001 (2001)
T. C. Group. TCG TPM Specification 1.2 (2006), www.trustedcomputing.org
Gallego, B., Serrano, D., Muñoz, A., Maña, A.: Security Patterns, towards a further level. In: The International Conference of Security and Cryptography, SECRYPT 2009, pp. 349–356 (2009)
Romanosky, S.: Security design patterns part 1, v1.4 (2001)
Armenteros, A., Muñoz, A., Maña, A., Serrano, D.: Security and Dependability in Ambient Intelligence scenarios: The communication prototype. In: International Conference on Enterprise Information Systems (2009)
Schumacher, M., Fernandez, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns - Integrating Security and Systems Engineering. John Wiley Sons, Chichester (2005)
Schumacher, M., Roedig, U.: Security engineering with patterns. Springer, Heidelberg (2001)
SERENITY. System engineering for security and dependability. IST project, funded by the EC (2006), http://www.serenityproject.org/
Wassermann, R., Cheng, B.: Security patterns. Technical ReportMSU-CSE-03-23, Department of Computer Science, Michigan State University (August 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Muñoz, A., Maña, A. (2011). Facilitating the Use of TPM Technologies Using the Serenity Framework. In: Calero, J.M.A., Yang, L.T., Mármol, F.G., García Villalba, L.J., Li, A.X., Wang, Y. (eds) Autonomic and Trusted Computing. ATC 2011. Lecture Notes in Computer Science, vol 6906. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23496-5_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-23496-5_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23495-8
Online ISBN: 978-3-642-23496-5
eBook Packages: Computer ScienceComputer Science (R0)