Advertisement

Security and Dependability Solutions for Networks and Devices

  • Sigrid GüCrgens
  • Andreas Fuchs
Chapter
Part of the Advances in Information Security book series (ADIS, volume 45)

Abstract

In this chapter we give an overview over the denotation of the SERENITY artefacts S&D Classes, Patterns and Implementations in the context of networks and devices. In order to demonstrate their necessity we sketch an example for confidential and authentic communication and storage that utilizes a trusted platform module, and model the relevant pattern. We then dissociate solutions for network and device related S&D requirements from those targeting the context of organizational or workflow and web services based solutions. Then we give a summary of the broad field of application for network and device solutions. Finally we clarify the meaning and interaction between classes, patterns and implementations by giving some concrete examples.

Keywords

Personal Digital Assistant Security Requirement Security Property Trusted Platform Module Dependability Solution 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Gürgens S, Rudolph C, Maña A, Muñoz A (2007) Facilitating the Use of TPM Technologies through S&D Pattern. In: DEXA – 18th IEEE International Conference on Database and Expert Systems ApplicationsGoogle Scholar
  2. 2.
    Lohr H, Ramasamy HGV, Sadeghi AR, Schulz S, Schunter M, Stuble C (2007) Enhancing Grid Security Using Trusted Virtualization. In: LECTURE NOTES IN COMPUTER SCIENCEGoogle Scholar
  3. 3.
    Microsoft (2008) Whitepaper – Windows Server 2008 Hyper-V and BitLocker http://www.microsoft.com/downloads/details.aspx?FamilyID=2c3c0615-baf4-4a9c-b613-3fda14e84545 Accessed Dec 2008
  4. 4.
    Netscape (1996) SSL 3.0 Specification http://web.archive.org/web/20080208141212/ http://wp.netscape.com/eng/ssl3/. Accessed Nov 2008
  5. 5.
    SERENITY Project (2008) A1 Deliverable – A1.D3.2 Extended set of S&D patterns at organizational level. EU IST IP 6th Framework Programme SERENITY 27587. http://www.serenity-forum.org/IMG/pdf/A1.D3.2_Extended_Set_of_S_D_patterns_at_organizational_level_v1.31_final.pdf Accessed Dec 2008
  6. 6.
    SERENITY Project (2008) A2 Deliverable – A2.D4.2 Extended Set of S&D Patterns for Workflows. EU IST IP 6th Framework Programme SERENITY 27587. http://www.serenity-forum.org/IMG/pdf/A2.D4.2_Extended_set_of_S_D_patterns_for_workflows_v2.1_final.pdf Accessed Dec 2008
  7. 7.
    SERENITY Project (2008) A3 Deliverable – A3.D4.2 Extended Set of S&D Patterns for Networks and Devices. EU IST IP 6th Framework Programme SERENITY 27587. http://www.serenity-forum.org/IMG/pdf/A3.D4.2_Extended_Set_Of_S_D_Patterns_For_Networks_And_Devices_v1.0_final.pdf Accessed Dec 2008
  8. 8.
    SERENITY Project (2007) A3 Deliverable – A3.D4.1 Initial Set of S&D Patterns for Networks and Devices. EU IST IP 6th Framework Programme SERENITY 27587. http://www.serenity-forum.org/IMG/pdf/A3.D4.1_initial_set_of_sd_patterns_for_networks_and_devices_v4.pdf Accessed Dec 2008
  9. 9.
    Stumpf F, Fuchs A, Katzenbeisser S, Eckert C (2008) Improving the Scalability of Platform Attestation. In: Proceedings of the Third ACM Workshop on Scalable Trusted Computing (ACM STC’8), pages 1–10, ACM PressGoogle Scholar
  10. 10.
    Stumpf F, Tafreschi O, Röder P, Eckert C (2006) A robust Integrity Reporting Protocol for Remote Attestation. In: Second Workshop on Advances in Trusted ComputingGoogle Scholar
  11. 11.
    IETF An Open Specification for Pretty Good Privacy Working-Group (1998–2008) RFCs 2440, 3156, 4880. http://www.ietf.org/html.charters/openpgp-charter.html. Accessed Nov 2008
  12. 12.
    IETF Network Working Group (2005) RFC 4120 The Kerberos Network Authentication Service (V5). http://www.ietf.org/rfc/rfc4120.txt. Accessed Nov 2008
  13. 13.
    IETF Network Working Group: RFCs 2409, 2407, 2408, 2412, 4306. http://www.ietf.org/rfc/rfc{2409,2407,2408,2412,4306}. Accessed Nov 2008
  14. 14.
    IETF Secure Shell Working-Group: RFCs 4250, 4256, 4255, 4254, 4253, 4252, 4251, 4344, 4335, 4419, 4462, 4716, 4819 http://tools.ietf.org/wg/secsh/. Accessed Nov 2008
  15. 15.
    IETF S/MIME Mail Security Working-Group: RFCs 2311, 2312, 2633, 2632, 3851, 3850, … http://www.ietf.org/html.charters/smime-charter.html. Accessed Nov 2008
  16. 16.
    IETF Transport Layer Security Working-Group: RFCs 2246, 4346, 5246, … http://www.ietf.org/html.charters/tls-charter.html. Accessed Nov 2008
  17. 17.
    Trusted Computing Group (TCG) (2006) TPM Specification 1.2 Rev 94. http://www.trustedcomputinggroup.org. Accessed 17 Jun 2008
  18. 18.
    The Workflow Management Coalition (1999) Workflow Management Coalition – Terminology & Glossary, p. 8. http://www.wfmc.org/standards/docs/TC-1011_term_glossary_v3.pdf. Accessed 17 Jun 2008
  19. 19.

Copyright information

© Springer-Verlag US 2009

Authors and Affiliations

  1. 1.Fraunhofer Institute for Secure Information TechnologyDarmstadtGermany
  2. 2.Fraunhofer Institute for Secure Information TechnologyDarmstadtGermany

Personalised recommendations