Facilitating the use of TPM technologies through S&D patterns

Sigrid Gürgens, Carsten Rudolph, Antonio Maña, Antonio Muñoz

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

1 Citation (Scopus)


Trusted platform modules (TPMs) can provide a variety of security functionalities. However, the TPM specification is highly complex and the deployment of TPM-based solutions is a difficult and delicate task. In this paper we propose the use of security patterns to specify TPM-based security solutions. The refined notion of security patterns developed in the SERENITY research project allows us to produce precise specifications of TPM-based solutions for particular security goals. This approach makes TPM technology available to system engineers without in-depth knowledge of trusted computing specifications.

Original languageEnglish
Title of host publicationProceedings DEXA 2007 18th International Workshop on Database and Expert Systems Applications
PublisherIEEE, Institute of Electrical and Electronics Engineers
Number of pages5
ISBN (Print)0769529321, 9780769529325
Publication statusPublished - 1 Dec 2007
Externally publishedYes
EventInternational Workshop on Secure Systems Methodologies Using Patterns 2007 - Regensburg, Germany
Duration: 3 Sept 20077 Sept 2007
Conference number: 1st
https://ieeexplore.ieee.org/xpl/conhome/4312838/proceeding (Proceedings)


ConferenceInternational Workshop on Secure Systems Methodologies Using Patterns 2007
Abbreviated titleSPattern 2007
OtherHeld within the "International Conference on Database and Expert Systems Applications 2007"
Internet address

Cite this