Abstract
Trusted platform modules (TPMs) can provide a variety of security functionalities. However, the TPM specification is highly complex and the deployment of TPM-based solutions is a difficult and delicate task. In this paper we propose the use of security patterns to specify TPM-based security solutions. The refined notion of security patterns developed in the SERENITY research project allows us to produce precise specifications of TPM-based solutions for particular security goals. This approach makes TPM technology available to system engineers without in-depth knowledge of trusted computing specifications.
Original language | English |
---|---|
Title of host publication | Proceedings DEXA 2007 18th International Workshop on Database and Expert Systems Applications |
Publisher | IEEE, Institute of Electrical and Electronics Engineers |
Pages | 765-769 |
Number of pages | 5 |
ISBN (Print) | 0769529321, 9780769529325 |
DOIs | |
Publication status | Published - 1 Dec 2007 |
Externally published | Yes |
Event | International Workshop on Secure Systems Methodologies Using Patterns 2007 - Regensburg, Germany Duration: 3 Sept 2007 → 7 Sept 2007 Conference number: 1st https://ieeexplore.ieee.org/xpl/conhome/4312838/proceeding (Proceedings) |
Conference
Conference | International Workshop on Secure Systems Methodologies Using Patterns 2007 |
---|---|
Abbreviated title | SPattern 2007 |
Country/Territory | Germany |
City | Regensburg |
Period | 3/09/07 → 7/09/07 |
Other | Held within the "International Conference on Database and Expert Systems Applications 2007" |
Internet address |