Kristoffersen, Thor O.; Rummelhoff, Ivar
Antall sider: 27
This is a security evaluation of the STG – its design as well as how it is being implemented. The evaluation includes the (physically separate but related) nodes of the RA and HSM. Threats from adversaries and security breaches as given by the risk assessment are modeled and documented.