Abstract
We present the application of the SERENITY methodology to the domain of long-term trusted electronic archiving, sometimes also referred to as trusted digital notary services. We address the SERENITY approach from thepoint of view of a company providing security solutions in the mentioned domain and adopt the role of a solution developer. In this chapter we show a complete vertical slice through the trusted archiving domain providing: (i) the relevant S&D properties, (ii) the S&D classes and S&D patterns on both organizational and technical level, (iii) describe how S&D patterns are integrated into a trusted longterm archiving service using the SERENITY Run-Time Framework (SRF). At the end of the chapter we put in perspective what a solution developer can learn from the process of capturing security knowledge according to SERENITY methodology and we discuss how existing implementations of archiving services can benefit from SERENITY approach in the future.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
European Commission, IDABC Programme (2008) Model Requirements for the Management of Electronic Records - MoReq2 Specification, CECA-CEE-CEEA
Consultative committee for Space Data Systems (CCSDS) (2003) Reference Model for an Open Archival Information System (OAIS), Recommendation for space data system standards
Adams C, Sylvester P, Zolotarev M, and Zuccherato R (2001) Internet X.509 Public Key Infrastructure Data Validation and Certification Server Protocols, RFC 3029
Wallace C, Pordesch U, Brandner R (2007) Long-Term Archive Service Requirements, Network Working Group, IETF RFC 4810
Adams C, Cain P, Pinkas D, Zuccherato R (2001) Internet X.509 Public Key Infrastructure - Time-Stamp Protocol (TSP), RFC 3161
Gondrom T, Brandner R, Pordesch U (2007) Evidence Record Syntax (ERS), RFC 4998
Jerman-Blažič A, Šaljič S, Gondrom T (2008) Extensible Markup Language Evidence Record Syntax (XML2ERS), draft-ietf-ltans-xmlers-02 (work in progress)
Kunz T, Okunick S, Pordesch U (2008) Data Structure for Security Suitabilities of Cryptographic Algorithms (DSSC), Long-term Archive And Notary Services (LTANS), IETF Internet Draft
Jerman-Blažič A, Džonova-Jerman B, Klobučar T (2007) Long-term trusted preservation service using service interaction protocol and evidence records, Amsterdam: Elsevier Science Publishers. Computer Standards & Interfaces, Volume 28, Issue 3, pp. 398-412
Jerman Blažič A et al (2008) Long-term Archive Protocol (LTAP), IETF, draft
Jerman Blažič A, Sylvester P (2005) Provision of Long-Term Archiving Service for Digitally Signed Documents Using an Archive Interaction Protocol, Berlin, Springer - Public Key Infrastructure: pp. 240-254
e-Keeper, Security Technology Competence Centre (SETCCE), http://www.setcce.si/eng/index42d.php, Accessed 27 November 2008
Archisoft, Fraunhofer Institute for Secure Information Technology (SIT), http://www.sit.fraunhofer.de/EN/forschungsbereich/tad/archisoft.jsp, Accessed 28. October 2008
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag US
About this chapter
Cite this chapter
Porekar, J., Klobučar, T., šaljič, S., Gabrijelčič, D. (2009). Applying the SERENITY Methodology to the Domain of Trusted Electronic Archiving. In: Kokolakis, S., Gómez, A., Spanoudakis, G. (eds) Security and Dependability for Ambient Intelligence. Advances in Information Security, vol 45. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-88775-3_19
Download citation
DOI: https://doi.org/10.1007/978-0-387-88775-3_19
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-88774-6
Online ISBN: 978-0-387-88775-3
eBook Packages: Computer ScienceComputer Science (R0)