Skip to main content

Security and Dependability Solutions for Networks and Devices

  • Chapter
  • First Online:
  • 370 Accesses

Part of the book series: Advances in Information Security ((ADIS,volume 45))

Abstract

In this chapter we give an overview over the denotation of the SERENITY artefacts S&D Classes, Patterns and Implementations in the context of networks and devices. In order to demonstrate their necessity we sketch an example for confidential and authentic communication and storage that utilizes a trusted platform module, and model the relevant pattern. We then dissociate solutions for network and device related S&D requirements from those targeting the context of organizational or workflow and web services based solutions. Then we give a summary of the broad field of application for network and device solutions. Finally we clarify the meaning and interaction between classes, patterns and implementations by giving some concrete examples.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gürgens S, Rudolph C, Maña A, Muñoz A (2007) Facilitating the Use of TPM Technologies through S&D Pattern. In: DEXA – 18th IEEE International Conference on Database and Expert Systems Applications

    Google Scholar 

  2. Lohr H, Ramasamy HGV, Sadeghi AR, Schulz S, Schunter M, Stuble C (2007) Enhancing Grid Security Using Trusted Virtualization. In: LECTURE NOTES IN COMPUTER SCIENCE

    Google Scholar 

  3. Microsoft (2008) Whitepaper – Windows Server 2008 Hyper-V and BitLocker http://www.microsoft.com/downloads/details.aspx?FamilyID=2c3c0615-baf4-4a9c-b613-3fda14e84545 Accessed Dec 2008

  4. Netscape (1996) SSL 3.0 Specification http://web.archive.org/web/20080208141212/ http://wp.netscape.com/eng/ssl3/. Accessed Nov 2008

  5. SERENITY Project (2008) A1 Deliverable – A1.D3.2 Extended set of S&D patterns at organizational level. EU IST IP 6th Framework Programme SERENITY 27587. http://www.serenity-forum.org/IMG/pdf/A1.D3.2_Extended_Set_of_S_D_patterns_at_organizational_level_v1.31_final.pdf Accessed Dec 2008

  6. SERENITY Project (2008) A2 Deliverable – A2.D4.2 Extended Set of S&D Patterns for Workflows. EU IST IP 6th Framework Programme SERENITY 27587. http://www.serenity-forum.org/IMG/pdf/A2.D4.2_Extended_set_of_S_D_patterns_for_workflows_v2.1_final.pdf Accessed Dec 2008

  7. SERENITY Project (2008) A3 Deliverable – A3.D4.2 Extended Set of S&D Patterns for Networks and Devices. EU IST IP 6th Framework Programme SERENITY 27587. http://www.serenity-forum.org/IMG/pdf/A3.D4.2_Extended_Set_Of_S_D_Patterns_For_Networks_And_Devices_v1.0_final.pdf Accessed Dec 2008

  8. SERENITY Project (2007) A3 Deliverable – A3.D4.1 Initial Set of S&D Patterns for Networks and Devices. EU IST IP 6th Framework Programme SERENITY 27587. http://www.serenity-forum.org/IMG/pdf/A3.D4.1_initial_set_of_sd_patterns_for_networks_and_devices_v4.pdf Accessed Dec 2008

  9. Stumpf F, Fuchs A, Katzenbeisser S, Eckert C (2008) Improving the Scalability of Platform Attestation. In: Proceedings of the Third ACM Workshop on Scalable Trusted Computing (ACM STC’8), pages 1–10, ACM Press

    Google Scholar 

  10. Stumpf F, Tafreschi O, Röder P, Eckert C (2006) A robust Integrity Reporting Protocol for Remote Attestation. In: Second Workshop on Advances in Trusted Computing

    Google Scholar 

  11. IETF An Open Specification for Pretty Good Privacy Working-Group (1998–2008) RFCs 2440, 3156, 4880. http://www.ietf.org/html.charters/openpgp-charter.html. Accessed Nov 2008

  12. IETF Network Working Group (2005) RFC 4120 The Kerberos Network Authentication Service (V5). http://www.ietf.org/rfc/rfc4120.txt. Accessed Nov 2008

  13. IETF Network Working Group: RFCs 2409, 2407, 2408, 2412, 4306. http://www.ietf.org/rfc/rfc{2409,2407,2408,2412,4306}. Accessed Nov 2008

  14. IETF Secure Shell Working-Group: RFCs 4250, 4256, 4255, 4254, 4253, 4252, 4251, 4344, 4335, 4419, 4462, 4716, 4819 http://tools.ietf.org/wg/secsh/. Accessed Nov 2008

  15. IETF S/MIME Mail Security Working-Group: RFCs 2311, 2312, 2633, 2632, 3851, 3850, … http://www.ietf.org/html.charters/smime-charter.html. Accessed Nov 2008

  16. IETF Transport Layer Security Working-Group: RFCs 2246, 4346, 5246, … http://www.ietf.org/html.charters/tls-charter.html. Accessed Nov 2008

  17. Trusted Computing Group (TCG) (2006) TPM Specification 1.2 Rev 94. http://www.trustedcomputinggroup.org. Accessed 17 Jun 2008

  18. The Workflow Management Coalition (1999) Workflow Management Coalition – Terminology & Glossary, p. 8. http://www.wfmc.org/standards/docs/TC-1011_term_glossary_v3.pdf. Accessed 17 Jun 2008

  19. Wikipedia http://en.wikipedia.org/wiki/List_of_antivirus_software. Accessed Nov 2008

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sigrid GüCrgens .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag US

About this chapter

Cite this chapter

GüCrgens, S., Fuchs, A. (2009). Security and Dependability Solutions for Networks and Devices. In: Kokolakis, S., Gómez, A., Spanoudakis, G. (eds) Security and Dependability for Ambient Intelligence. Advances in Information Security, vol 45. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-88775-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-88775-3_7

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-88774-6

  • Online ISBN: 978-0-387-88775-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics