Applying the SERENITY Methodology to the Domain of Trusted Electronic Archiving

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present the application of the SERENITY methodology to the domain of long-term trusted electronic archiving, sometimes also referred to as trusted digital notary services. We address the SERENITY approach from thepoint of view of a company providing security solutions in the mentioned domain and adopt the role of a solution developer. In this chapter we show a complete vertical slice through the trusted archiving domain providing: (i) the relevant S&D properties, (ii) the S&D classes and S&D patterns on both organizational and technical level, (iii) describe how S&D patterns are integrated into a trusted longterm archiving service using the SERENITY Run-Time Framework (SRF). At the end of the chapter we put in perspective what a solution developer can learn from the process of capturing security knowledge according to SERENITY methodology and we discuss how existing implementations of archiving services can benefit from SERENITY approach in the future. © Springer Science + Business Media, LLC 2009.

Cite

CITATION STYLE

APA

Porekar, J., Klobučar, T., šaljič, S., & Gabrijelčič, D. (2009). Applying the SERENITY Methodology to the Domain of Trusted Electronic Archiving. Advances in Information Security, 45, 343–357. https://doi.org/10.1007/978-0-387-88775-3_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free