Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Facilitating the use of TPM technologies through S&D pattern

: Gürgens, S.; Rudolph, C.; Mana, A.; Munoz, A.


Tjoa, A.M.:
18th International Conference on Database and Expert Systems Applications, DEXA 2007. Proceedings : Regensburg, Germany, 3 - 7 September 2007
Los Alamitos, Calif.: IEEE Computer Society, 2007
ISBN: 0-7695-2932-1
ISBN: 978-0-7695-2932-5
International Conference on Database and Expert Systems Applications (DEXA) <18, 2007, Regensburg>
Conference Paper
Fraunhofer SIT ()
trusted computing; TPM; security pattern

Trusted platform modules (TPMs) can provide a variety of security functionalities. However, the TPM specification is highly complex and the deployment of TPM-based solutions is a difficult and delicate task. In this paper we propose the use of security patterns to specify TPM-based security solutions. The refined notion of security patterns developed in the SERENITY research project allows us to produce precise specifications of TPM-based solutions for particular security goals. This approach makes TPM technology available to system engineers without in-depth knowledge of trusted computing specifications.