A cluster of patterns for trusted computing

dc.centroE.T.S.I. Informáticaes_ES
dc.contributor.authorFernandez, Eduardo B.
dc.contributor.authorMuñoz-Gallego, Antonio Jesús
dc.date.accessioned2025-02-14T13:10:16Z
dc.date.available2025-02-14T13:10:16Z
dc.date.issued2025-02
dc.departamentoLenguajes y Ciencias de la Computación
dc.description.abstractThe proliferation of Internet of Things and cyberphysical systems has introduced unprecedented challenges in ensuring the integrity and confidentiality of critical data, making robust security mechanisms essential. There are several mechanisms intended to assure trust with respect to the software loaded into the system and the trustworthiness of the boot process. These mechanisms start from a Root of Trust (RoT), from where all the other trusts, e.g., for components and software are derived. As part of the RoT, a Secure Storage is needed. This Secure Storage can be considered as part of the RoT or considered a separate component. After a RoT is established, a Trusted Boot can be performed. The execution of computational processes can then be supported by using separate execution zones (Zone Isolation). More complex trust functions such as remote attestation can be performed by a Trusted Platform Module (TPM). In this paper, we propose security patterns for these components. The abstraction power of patterns can be used to define the basic aspects that each of these components must have, thus serving as reference for designers and for security evaluation.es_ES
dc.description.sponsorshipFunding for open access publishing: Universidad de Málaga/ CBUAes_ES
dc.identifier.citationFernandez, E. B., & Muñoz, A. (2025). A cluster of patterns for trusted computing. International Journal Of Information Security, 24(1). https://doi.org/10.1007/s10207-024-00972-3es_ES
dc.identifier.doi10.1007/s10207-024-00972-3
dc.identifier.urihttps://hdl.handle.net/10630/37902
dc.language.isoenges_ES
dc.publisherSpringer Naturees_ES
dc.rightsAtribución 4.0 Internacional*
dc.rights.accessRightsopen accesses_ES
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/*
dc.subjectSeguridad informáticaes_ES
dc.subject.otherTrusted systemses_ES
dc.subject.otherSecurity patternses_ES
dc.subject.otherRoot of Trustes_ES
dc.subject.otherTrusted processinges_ES
dc.titleA cluster of patterns for trusted computinges_ES
dc.typejournal articlees_ES
dc.type.hasVersionVoRes_ES
dspace.entity.typePublication
relation.isAuthorOfPublication8f1a37f8-6ea7-4fcf-9ed7-edd9c5c80dca
relation.isAuthorOfPublication.latestForDiscovery8f1a37f8-6ea7-4fcf-9ed7-edd9c5c80dca

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
s10207-024-00972-3.pdf
Size:
761.43 KB
Format:
Adobe Portable Document Format
Description:

Collections