Facilitating the use of TPM technologies using the serenity framework

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Trusted platform modules (TPMs) specification is highly complex and therefore the deployment of TPM -based security solutions is equally complicated and difficult; although they can provide a wide range of security functionalities. In order to make TPM technology available to system engineers without their needing to have in-depth knowledge of trusted computing specifications we propose, in this paper, to develop an approach using security patterns to specify TPM-based security solutions. Ideally suited to producing precise specifications of TPM -based solutions for certain security goals are the refined notions of security patterns developed in the SERENITY research project. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Muñoz, A., & Maña, A. (2011). Facilitating the use of TPM technologies using the serenity framework. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6906 LNCS, pp. 164–174). https://doi.org/10.1007/978-3-642-23496-5_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free