Facilitating the use of TPM technologies through S&D patterns

Sigrid Gürgens, Carsten Rudolph, Antonio Maña, Antonio Muñoz

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Abstract

Trusted platform modules (TPMs) can provide a variety of security functionalities. However, the TPM specification is highly complex and the deployment of TPM-based solutions is a difficult and delicate task. In this paper we propose the use of security patterns to specify TPM-based security solutions. The refined notion of security patterns developed in the SERENITY research project allows us to produce precise specifications of TPM-based solutions for particular security goals. This approach makes TPM technology available to system engineers without in-depth knowledge of trusted computing specifications.

Original languageEnglish
Title of host publicationProceedings DEXA 2007 18th International Workshop on Database and Expert Systems Applications
Pages765-769
Number of pages5
DOIs
Publication statusPublished - 1 Dec 2007
Externally publishedYes
EventInternational Workshop on Secure Systems Methodologies Using Patterns 2007 - Regensburg, Germany
Duration: 3 Sep 20077 Sep 2007
Conference number: 1st
https://ieeexplore.ieee.org/xpl/conhome/4312838/proceeding (Proceedings)

Conference

ConferenceInternational Workshop on Secure Systems Methodologies Using Patterns 2007
Abbreviated titleSPattern 2007
CountryGermany
CityRegensburg
Period3/09/077/09/07
OtherHeld within the "International Conference on Database and Expert Systems Applications 2007"
Internet address

Cite this