Facilitating the Use of TPM Technologies Using the Serenity Framework
Trusted platform modules (TPMs) specification is highly complex and therefore the deployment of TPM –based security solutions is equally complicated and difficult; although they can provide a wide range of security functionalities. In order to make TPM technology available to system engineers without their needing to have in-depth knowledge of trusted computing specifications we propose, in this paper, to develop an approach using security patterns to specify TPM-based security solutions. Ideally suited to producing precise specifications of TPM –based solutions for certain security goals are the refined notions of security patterns developed in the SERENITY research project.
KeywordsTrust Platform Module Security Pattern Interface Adaptor Message Sequence Chart Trust Computing Group
Unable to display preview. Download preview PDF.
- 1.Fernandez, E.: Security patterns. In: Procs. of the Eigth International Symposium on System and Information Security - SSI 2006, Keynote talk, Sao Jose dos Campos, Brazil (November 2006)Google Scholar
- 2.Fernandez, E., Rouyi, P.: A pattern language for security models. In: Pattern Languages of Program Design, PLoP 2001 (2001)Google Scholar
- 3.T. C. Group. TCG TPM Specification 1.2 (2006), www.trustedcomputing.org
- 4.Gallego, B., Serrano, D., Muñoz, A., Maña, A.: Security Patterns, towards a further level. In: The International Conference of Security and Cryptography, SECRYPT 2009, pp. 349–356 (2009)Google Scholar
- 5.Romanosky, S.: Security design patterns part 1, v1.4 (2001) Google Scholar
- 6.Armenteros, A., Muñoz, A., Maña, A., Serrano, D.: Security and Dependability in Ambient Intelligence scenarios: The communication prototype. In: International Conference on Enterprise Information Systems (2009)Google Scholar
- 7.Schumacher, M., Fernandez, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns - Integrating Security and Systems Engineering. John Wiley Sons, Chichester (2005)Google Scholar
- 8.Schumacher, M., Roedig, U.: Security engineering with patterns. Springer, Heidelberg (2001)Google Scholar
- 9.SERENITY. System engineering for security and dependability. IST project, funded by the EC (2006), http://www.serenityproject.org/
- 10.Wassermann, R., Cheng, B.: Security patterns. Technical ReportMSU-CSE-03-23, Department of Computer Science, Michigan State University (August 2003)Google Scholar