Final Architecture Specification of security, privacy, and incentive mechanisms

In this document, we define the NADA security architecture based on refined use case scenarios, a derived high level model and security analysis. For the architecure design and verification we are applying the well known STRIDE model.

[1]  Roland Rieke,et al.  The SH-Verification Tool , 2000, FLAIRS.

[2]  N. Kuntze,et al.  TRUST IN THE P 2 P DISTRIBUTION OF VIRTUAL GOODS , 2009 .

[3]  Carsten Rudolph,et al.  Trust in Peer-to-Peer Content Distribution Protocols , 2010, Workshop in Information Security Theory and Practice.

[4]  Carsten Rudolph,et al.  On the Security Validation of Integrated Security Solutions , 2009, SEC.

[5]  Carsten Rudolph,et al.  Reliable Identities Using Off-the-Shelf Hardware Security in MANETs , 2009, 2009 International Conference on Computational Science and Engineering.

[6]  R. Sailer,et al.  sHype : Secure Hypervisor Approach to Trusted Virtualized Systems , 2005 .

[7]  Michael Howard,et al.  The security development lifecycle : SDL, a process for developing demonstrably more secure software , 2006 .

[8]  Carsten Rudolph,et al.  Towards a Generic Process for Security Pattern Integration , 2009, 2009 20th International Workshop on Database and Expert Systems Application.