A cluster of patterns for trusted computing
Loading...
Identifiers
Publication date
Reading date
Collaborators
Advisors
Tutors
Editors
Journal Title
Journal ISSN
Volume Title
Publisher
Springer Nature
Share
Center
Department/Institute
Keywords
Abstract
The proliferation of Internet of Things and cyberphysical systems has introduced unprecedented challenges in ensuring the
integrity and confidentiality of critical data, making robust security mechanisms essential. There are several mechanisms
intended to assure trust with respect to the software loaded into the system and the trustworthiness of the boot process. These
mechanisms start from a Root of Trust (RoT), from where all the other trusts, e.g., for components and software are derived. As
part of the RoT, a Secure Storage is needed. This Secure Storage can be considered as part of the RoT or considered a separate
component. After a RoT is established, a Trusted Boot can be performed. The execution of computational processes can then
be supported by using separate execution zones (Zone Isolation). More complex trust functions such as remote attestation can
be performed by a Trusted Platform Module (TPM). In this paper, we propose security patterns for these components. The
abstraction power of patterns can be used to define the basic aspects that each of these components must have, thus serving
as reference for designers and for security evaluation.
Description
Bibliographic citation
Fernandez, E. B., & Muñoz, A. (2025). A cluster of patterns for trusted computing. International Journal Of Information Security, 24(1). https://doi.org/10.1007/s10207-024-00972-3
Collections
Endorsement
Review
Supplemented By
Referenced by
Creative Commons license
Except where otherwised noted, this item's license is described as Atribución 4.0 Internacional













