RT Journal Article T1 A cluster of patterns for trusted computing A1 Fernandez, Eduardo B. A1 Muñoz-Gallego, Antonio Jesús K1 Seguridad informática AB The proliferation of Internet of Things and cyberphysical systems has introduced unprecedented challenges in ensuring theintegrity and confidentiality of critical data, making robust security mechanisms essential. There are several mechanismsintended to assure trust with respect to the software loaded into the system and the trustworthiness of the boot process. Thesemechanisms start from a Root of Trust (RoT), from where all the other trusts, e.g., for components and software are derived. Aspart of the RoT, a Secure Storage is needed. This Secure Storage can be considered as part of the RoT or considered a separatecomponent. After a RoT is established, a Trusted Boot can be performed. The execution of computational processes can thenbe supported by using separate execution zones (Zone Isolation). More complex trust functions such as remote attestation canbe performed by a Trusted Platform Module (TPM). In this paper, we propose security patterns for these components. Theabstraction power of patterns can be used to define the basic aspects that each of these components must have, thus servingas reference for designers and for security evaluation. PB Springer Nature YR 2025 FD 2025-02 LK https://hdl.handle.net/10630/37902 UL https://hdl.handle.net/10630/37902 LA eng NO Fernandez, E. B., & Muñoz, A. (2025). A cluster of patterns for trusted computing. International Journal Of Information Security, 24(1). https://doi.org/10.1007/s10207-024-00972-3 NO Funding for open access publishing: Universidad de Málaga/ CBUA DS RIUMA. Repositorio Institucional de la Universidad de Málaga RD 20 ene 2026