Trusted platform modules (TPMs) specification is highly complex and therefore the deployment of TPM -based security solutions is equally complicated and difficult; although they can provide a wide range of security functionalities. In order to make TPM technology available to system engineers without their needing to have in-depth knowledge of trusted computing specifications we propose, in this paper, to develop an approach using security patterns to specify TPM-based security solutions. Ideally suited to producing precise specifications of TPM -based solutions for certain security goals are the refined notions of security patterns developed in the SERENITY research project. © 2011 Springer-Verlag.
CITATION STYLE
Muñoz, A., & Maña, A. (2011). Facilitating the use of TPM technologies using the serenity framework. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6906 LNCS, pp. 164–174). https://doi.org/10.1007/978-3-642-23496-5_12
Mendeley helps you to discover research relevant for your work.