Facilitating the Use of TPM Technologies Using the Serenity Framework

  • Antonio Muñoz
  • Antonio Maña
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6906)

Abstract

Trusted platform modules (TPMs) specification is highly complex and therefore the deployment of TPM –based security solutions is equally complicated and difficult; although they can provide a wide range of security functionalities. In order to make TPM technology available to system engineers without their needing to have in-depth knowledge of trusted computing specifications we propose, in this paper, to develop an approach using security patterns to specify TPM-based security solutions. Ideally suited to producing precise specifications of TPM –based solutions for certain security goals are the refined notions of security patterns developed in the SERENITY research project.

Keywords

Trust Platform Module Security Pattern Interface Adaptor Message Sequence Chart Trust Computing Group 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Fernandez, E.: Security patterns. In: Procs. of the Eigth International Symposium on System and Information Security - SSI 2006, Keynote talk, Sao Jose dos Campos, Brazil (November 2006)Google Scholar
  2. 2.
    Fernandez, E., Rouyi, P.: A pattern language for security models. In: Pattern Languages of Program Design, PLoP 2001 (2001)Google Scholar
  3. 3.
    T. C. Group. TCG TPM Specification 1.2 (2006), www.trustedcomputing.org
  4. 4.
    Gallego, B., Serrano, D., Muñoz, A., Maña, A.: Security Patterns, towards a further level. In: The International Conference of Security and Cryptography, SECRYPT 2009, pp. 349–356 (2009)Google Scholar
  5. 5.
    Romanosky, S.: Security design patterns part 1, v1.4 (2001) Google Scholar
  6. 6.
    Armenteros, A., Muñoz, A., Maña, A., Serrano, D.: Security and Dependability in Ambient Intelligence scenarios: The communication prototype. In: International Conference on Enterprise Information Systems (2009)Google Scholar
  7. 7.
    Schumacher, M., Fernandez, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns - Integrating Security and Systems Engineering. John Wiley Sons, Chichester (2005)Google Scholar
  8. 8.
    Schumacher, M., Roedig, U.: Security engineering with patterns. Springer, Heidelberg (2001)Google Scholar
  9. 9.
    SERENITY. System engineering for security and dependability. IST project, funded by the EC (2006), http://www.serenityproject.org/
  10. 10.
    Wassermann, R., Cheng, B.: Security patterns. Technical ReportMSU-CSE-03-23, Department of Computer Science, Michigan State University (August 2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Antonio Muñoz
    • 1
  • Antonio Maña
    • 1
  1. 1.Computer Science DepartmentUniversity of MálagaSpain

Personalised recommendations