TU Darmstadt / ULB / TUbiblio

Patterns for Secure Boot and Secure Storage in Computer Systems

Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel (2010)
Patterns for Secure Boot and Secure Storage in Computer Systems.
Konferenzveröffentlichung, Bibliographie

Kurzbeschreibung (Abstract)

Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes system state integrity and the secure link between the software and hardware of a computing platform. Although security patterns exist for operating system security, access control, and authentication, there is still none of Trusted Computing aspects. In this paper, we introduce security patterns for secure boot and for secure storage, which are important basic Trusted Computing concepts. Secure boot is at the heart of most security solutions and secure storage is fundamental for application-level security: it ensures that the integrity of software is verified before accessing stored data. Our paper aims at complementing existing system security patterns by presenting the common patterns underlying the different realizations of secure boot and secure storage.

Typ des Eintrags: Konferenzveröffentlichung
Erschienen: 2010
Autor(en): Löhr, Hans ; Sadeghi, Ahmad-Reza ; Winandy, Marcel
Art des Eintrags: Bibliographie
Titel: Patterns for Secure Boot and Secure Storage in Computer Systems
Sprache: Deutsch
Publikationsjahr: Februar 2010
Buchtitel: 4th International Workshop on Secure systems methodologies using patterns (SPattern 2010),
Zugehörige Links:
Kurzbeschreibung (Abstract):

Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes system state integrity and the secure link between the software and hardware of a computing platform. Although security patterns exist for operating system security, access control, and authentication, there is still none of Trusted Computing aspects. In this paper, we introduce security patterns for secure boot and for secure storage, which are important basic Trusted Computing concepts. Secure boot is at the heart of most security solutions and secure storage is fundamental for application-level security: it ensures that the integrity of software is verified before accessing stored data. Our paper aims at complementing existing system security patterns by presenting the common patterns underlying the different realizations of secure boot and secure storage.

Freie Schlagworte: Secure Things;Secure Boot, Secure Storage, Security Pattern
ID-Nummer: TUD-CS-2010-2416
Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik
20 Fachbereich Informatik > Systemsicherheit
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
Hinterlegungsdatum: 10 Mär 2016 10:18
Letzte Änderung: 03 Jun 2018 21:31
PPN:
Zugehörige Links:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen