Abstract
In this chapter we give an overview over the denotation of the SERENITY artefacts S&D Classes, Patterns and Implementations in the context of networks and devices. In order to demonstrate their necessity we sketch an example for confidential and authentic communication and storage that utilizes a trusted platform module, and model the relevant pattern. We then dissociate solutions for network and device related S&D requirements from those targeting the context of organizational or workflow and web services based solutions. Then we give a summary of the broad field of application for network and device solutions. Finally we clarify the meaning and interaction between classes, patterns and implementations by giving some concrete examples.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Gürgens S, Rudolph C, Maña A, Muñoz A (2007) Facilitating the Use of TPM Technologies through S&D Pattern. In: DEXA – 18th IEEE International Conference on Database and Expert Systems Applications
Lohr H, Ramasamy HGV, Sadeghi AR, Schulz S, Schunter M, Stuble C (2007) Enhancing Grid Security Using Trusted Virtualization. In: LECTURE NOTES IN COMPUTER SCIENCE
Microsoft (2008) Whitepaper – Windows Server 2008 Hyper-V and BitLocker http://www.microsoft.com/downloads/details.aspx?FamilyID=2c3c0615-baf4-4a9c-b613-3fda14e84545 Accessed Dec 2008
Netscape (1996) SSL 3.0 Specification http://web.archive.org/web/20080208141212/ http://wp.netscape.com/eng/ssl3/. Accessed Nov 2008
SERENITY Project (2008) A1 Deliverable – A1.D3.2 Extended set of S&D patterns at organizational level. EU IST IP 6th Framework Programme SERENITY 27587. http://www.serenity-forum.org/IMG/pdf/A1.D3.2_Extended_Set_of_S_D_patterns_at_organizational_level_v1.31_final.pdf Accessed Dec 2008
SERENITY Project (2008) A2 Deliverable – A2.D4.2 Extended Set of S&D Patterns for Workflows. EU IST IP 6th Framework Programme SERENITY 27587. http://www.serenity-forum.org/IMG/pdf/A2.D4.2_Extended_set_of_S_D_patterns_for_workflows_v2.1_final.pdf Accessed Dec 2008
SERENITY Project (2008) A3 Deliverable – A3.D4.2 Extended Set of S&D Patterns for Networks and Devices. EU IST IP 6th Framework Programme SERENITY 27587. http://www.serenity-forum.org/IMG/pdf/A3.D4.2_Extended_Set_Of_S_D_Patterns_For_Networks_And_Devices_v1.0_final.pdf Accessed Dec 2008
SERENITY Project (2007) A3 Deliverable – A3.D4.1 Initial Set of S&D Patterns for Networks and Devices. EU IST IP 6th Framework Programme SERENITY 27587. http://www.serenity-forum.org/IMG/pdf/A3.D4.1_initial_set_of_sd_patterns_for_networks_and_devices_v4.pdf Accessed Dec 2008
Stumpf F, Fuchs A, Katzenbeisser S, Eckert C (2008) Improving the Scalability of Platform Attestation. In: Proceedings of the Third ACM Workshop on Scalable Trusted Computing (ACM STC’8), pages 1–10, ACM Press
Stumpf F, Tafreschi O, Röder P, Eckert C (2006) A robust Integrity Reporting Protocol for Remote Attestation. In: Second Workshop on Advances in Trusted Computing
IETF An Open Specification for Pretty Good Privacy Working-Group (1998–2008) RFCs 2440, 3156, 4880. http://www.ietf.org/html.charters/openpgp-charter.html. Accessed Nov 2008
IETF Network Working Group (2005) RFC 4120 The Kerberos Network Authentication Service (V5). http://www.ietf.org/rfc/rfc4120.txt. Accessed Nov 2008
IETF Network Working Group: RFCs 2409, 2407, 2408, 2412, 4306. http://www.ietf.org/rfc/rfc{2409,2407,2408,2412,4306}. Accessed Nov 2008
IETF Secure Shell Working-Group: RFCs 4250, 4256, 4255, 4254, 4253, 4252, 4251, 4344, 4335, 4419, 4462, 4716, 4819 http://tools.ietf.org/wg/secsh/. Accessed Nov 2008
IETF S/MIME Mail Security Working-Group: RFCs 2311, 2312, 2633, 2632, 3851, 3850, … http://www.ietf.org/html.charters/smime-charter.html. Accessed Nov 2008
IETF Transport Layer Security Working-Group: RFCs 2246, 4346, 5246, … http://www.ietf.org/html.charters/tls-charter.html. Accessed Nov 2008
Trusted Computing Group (TCG) (2006) TPM Specification 1.2 Rev 94. http://www.trustedcomputinggroup.org. Accessed 17 Jun 2008
The Workflow Management Coalition (1999) Workflow Management Coalition – Terminology & Glossary, p. 8. http://www.wfmc.org/standards/docs/TC-1011_term_glossary_v3.pdf. Accessed 17 Jun 2008
Wikipedia http://en.wikipedia.org/wiki/List_of_antivirus_software. Accessed Nov 2008
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag US
About this chapter
Cite this chapter
GüCrgens, S., Fuchs, A. (2009). Security and Dependability Solutions for Networks and Devices. In: Kokolakis, S., Gómez, A., Spanoudakis, G. (eds) Security and Dependability for Ambient Intelligence. Advances in Information Security, vol 45. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-88775-3_7
Download citation
DOI: https://doi.org/10.1007/978-0-387-88775-3_7
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-88774-6
Online ISBN: 978-0-387-88775-3
eBook Packages: Computer ScienceComputer Science (R0)