A cluster of patterns for trusted computing
| dc.centro | E.T.S.I. Informática | es_ES |
| dc.contributor.author | Fernandez, Eduardo B. | |
| dc.contributor.author | Muñoz-Gallego, Antonio Jesús | |
| dc.date.accessioned | 2025-02-14T13:10:16Z | |
| dc.date.available | 2025-02-14T13:10:16Z | |
| dc.date.issued | 2025-02 | |
| dc.departamento | Lenguajes y Ciencias de la Computación | |
| dc.description.abstract | The proliferation of Internet of Things and cyberphysical systems has introduced unprecedented challenges in ensuring the integrity and confidentiality of critical data, making robust security mechanisms essential. There are several mechanisms intended to assure trust with respect to the software loaded into the system and the trustworthiness of the boot process. These mechanisms start from a Root of Trust (RoT), from where all the other trusts, e.g., for components and software are derived. As part of the RoT, a Secure Storage is needed. This Secure Storage can be considered as part of the RoT or considered a separate component. After a RoT is established, a Trusted Boot can be performed. The execution of computational processes can then be supported by using separate execution zones (Zone Isolation). More complex trust functions such as remote attestation can be performed by a Trusted Platform Module (TPM). In this paper, we propose security patterns for these components. The abstraction power of patterns can be used to define the basic aspects that each of these components must have, thus serving as reference for designers and for security evaluation. | es_ES |
| dc.description.sponsorship | Funding for open access publishing: Universidad de Málaga/ CBUA | es_ES |
| dc.identifier.citation | Fernandez, E. B., & Muñoz, A. (2025). A cluster of patterns for trusted computing. International Journal Of Information Security, 24(1). https://doi.org/10.1007/s10207-024-00972-3 | es_ES |
| dc.identifier.doi | 10.1007/s10207-024-00972-3 | |
| dc.identifier.uri | https://hdl.handle.net/10630/37902 | |
| dc.language.iso | eng | es_ES |
| dc.publisher | Springer Nature | es_ES |
| dc.rights | Atribución 4.0 Internacional | * |
| dc.rights.accessRights | open access | es_ES |
| dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | * |
| dc.subject | Seguridad informática | es_ES |
| dc.subject.other | Trusted systems | es_ES |
| dc.subject.other | Security patterns | es_ES |
| dc.subject.other | Root of Trust | es_ES |
| dc.subject.other | Trusted processing | es_ES |
| dc.title | A cluster of patterns for trusted computing | es_ES |
| dc.type | journal article | es_ES |
| dc.type.hasVersion | VoR | es_ES |
| dspace.entity.type | Publication | |
| relation.isAuthorOfPublication | 8f1a37f8-6ea7-4fcf-9ed7-edd9c5c80dca | |
| relation.isAuthorOfPublication.latestForDiscovery | 8f1a37f8-6ea7-4fcf-9ed7-edd9c5c80dca |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- s10207-024-00972-3.pdf
- Size:
- 761.43 KB
- Format:
- Adobe Portable Document Format
- Description:

