We present the application of the SERENITY methodology to the domain of long-term trusted electronic archiving, sometimes also referred to as trusted digital notary services. We address the SERENITY approach from thepoint of view of a company providing security solutions in the mentioned domain and adopt the role of a solution developer. In this chapter we show a complete vertical slice through the trusted archiving domain providing: (i) the relevant S&D properties, (ii) the S&D classes and S&D patterns on both organizational and technical level, (iii) describe how S&D patterns are integrated into a trusted longterm archiving service using the SERENITY Run-Time Framework (SRF). At the end of the chapter we put in perspective what a solution developer can learn from the process of capturing security knowledge according to SERENITY methodology and we discuss how existing implementations of archiving services can benefit from SERENITY approach in the future. © Springer Science + Business Media, LLC 2009.
CITATION STYLE
Porekar, J., Klobučar, T., šaljič, S., & Gabrijelčič, D. (2009). Applying the SERENITY Methodology to the Domain of Trusted Electronic Archiving. Advances in Information Security, 45, 343–357. https://doi.org/10.1007/978-0-387-88775-3_19
Mendeley helps you to discover research relevant for your work.