• Corpus ID: 18417374

2 How a Typical Hardware Security Modules Looks Like

@inproceedings{Wolf20132HA,
  title={2 How a Typical Hardware Security Modules Looks Like},
  author={Marko Wolf},
  year={2013}
}
  • M. Wolf
  • Published 2013
  • Computer Science
Being able to trust another IT system that “it always acts as expected” requires consecutive trust into all layers, which are involved in creating a trustworthy IT system. Figure 1 depicts the “pyramid of trust” for a typical IT system, where trust into the whole IT system requires that each layer can rely on the effective security of its underlying layer without being able to verify it directly. This means for instance that a perfect software and hardware security solution could be rendered… 

Figures from this paper