Skip to main content

Applying the SERENITY Methodology to the Domain of Trusted Electronic Archiving

  • Chapter
  • First Online:
  • 374 Accesses

Part of the book series: Advances in Information Security ((ADIS,volume 45))

Abstract

We present the application of the SERENITY methodology to the domain of long-term trusted electronic archiving, sometimes also referred to as trusted digital notary services. We address the SERENITY approach from thepoint of view of a company providing security solutions in the mentioned domain and adopt the role of a solution developer. In this chapter we show a complete vertical slice through the trusted archiving domain providing: (i) the relevant S&D properties, (ii) the S&D classes and S&D patterns on both organizational and technical level, (iii) describe how S&D patterns are integrated into a trusted longterm archiving service using the SERENITY Run-Time Framework (SRF). At the end of the chapter we put in perspective what a solution developer can learn from the process of capturing security knowledge according to SERENITY methodology and we discuss how existing implementations of archiving services can benefit from SERENITY approach in the future.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. European Commission, IDABC Programme (2008) Model Requirements for the Management of Electronic Records - MoReq2 Specification, CECA-CEE-CEEA

    Google Scholar 

  2. Consultative committee for Space Data Systems (CCSDS) (2003) Reference Model for an Open Archival Information System (OAIS), Recommendation for space data system standards

    Google Scholar 

  3. Adams C, Sylvester P, Zolotarev M, and Zuccherato R (2001) Internet X.509 Public Key Infrastructure Data Validation and Certification Server Protocols, RFC 3029

    Google Scholar 

  4. Wallace C, Pordesch U, Brandner R (2007) Long-Term Archive Service Requirements, Network Working Group, IETF RFC 4810

    Google Scholar 

  5. Adams C, Cain P, Pinkas D, Zuccherato R (2001) Internet X.509 Public Key Infrastructure - Time-Stamp Protocol (TSP), RFC 3161

    Google Scholar 

  6. Gondrom T, Brandner R, Pordesch U (2007) Evidence Record Syntax (ERS), RFC 4998

    Google Scholar 

  7. Jerman-Blažič A, Šaljič S, Gondrom T (2008) Extensible Markup Language Evidence Record Syntax (XML2ERS), draft-ietf-ltans-xmlers-02 (work in progress)

    Google Scholar 

  8. Kunz T, Okunick S, Pordesch U (2008) Data Structure for Security Suitabilities of Cryptographic Algorithms (DSSC), Long-term Archive And Notary Services (LTANS), IETF Internet Draft

    Google Scholar 

  9. Jerman-Blažič A, Džonova-Jerman B, Klobučar T (2007) Long-term trusted preservation service using service interaction protocol and evidence records, Amsterdam: Elsevier Science Publishers. Computer Standards & Interfaces, Volume 28, Issue 3, pp. 398-412

    Google Scholar 

  10. Jerman Blažič A et al (2008) Long-term Archive Protocol (LTAP), IETF, draft

    Google Scholar 

  11. Jerman Blažič A, Sylvester P (2005) Provision of Long-Term Archiving Service for Digitally Signed Documents Using an Archive Interaction Protocol, Berlin, Springer - Public Key Infrastructure: pp. 240-254

    Google Scholar 

  12. e-Keeper, Security Technology Competence Centre (SETCCE), http://www.setcce.si/eng/index42d.php, Accessed 27 November 2008

  13. Archisoft, Fraunhofer Institute for Secure Information Technology (SIT), http://www.sit.fraunhofer.de/EN/forschungsbereich/tad/archisoft.jsp, Accessed 28. October 2008

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jan Porekar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag US

About this chapter

Cite this chapter

Porekar, J., Klobučar, T., šaljič, S., Gabrijelčič, D. (2009). Applying the SERENITY Methodology to the Domain of Trusted Electronic Archiving. In: Kokolakis, S., Gómez, A., Spanoudakis, G. (eds) Security and Dependability for Ambient Intelligence. Advances in Information Security, vol 45. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-88775-3_19

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-88775-3_19

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-88774-6

  • Online ISBN: 978-0-387-88775-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics