Over the past years, the computing industry has started various initiatives announced to increase computer security by means of new hardware architectures. The most notable effort...
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Traditionally, creation and revocation of certificates are performed manually, by trusted agents, under conditions that are rarely formalized. This approach to certificate managem...
Trust is a necessary concept to realize the Semantic Web. But how can we build a “Web of Trust”? We first argue that a small “Web of Trust” for each community is very esse...
Co-evolution of system models and system tests can be used for exploratory system identification of physical platforms. Here we demonstrate how the amount of physical testing can ...